We take Work-Life-Balance seriously! This Jobot Job is hosted by: Madeline Lazarus Are you a fit? Easy Apply now by clicking the "Apply" button and sending us your resume. Salary: $100,000 - $150,000 per year A bit about us: We work on challenging problems, and our work has a high impact We are a small business that provides Information Technology, Cybersecurity, and Software Engineering to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape. Why join us? We pride ourselves on offering Work-Life-Balance Competitive Salaries Excellent Benefits We offer Stability Great Mentorship We are family-centric We make sure you are paired up to work with like-minded colleagues Job Details Join Our Team as a Senior SIGINT Development Analyst! Are you ready to take your career to the next level? We are seeking a dynamic and experienced Senior SIGINT Development Analyst to join our innovative team. If you have a passion for cutting-edge technology and a knack for analytical thinking, this is the perfect opportunity for you! What You'll Be Doing: As a Senior SIGINT Development Analyst, you will play a crucial role in optimizing and developing customer accesses. Your responsibilities will include conducting in-depth research and analysis of collection and collateral data to develop targets of interest and create analytic strategies. You will identify target communications within the global network, focusing on data and voice communications, including DNR (voice/FAX), DNI, and other advanced technologies over IP. Key Responsibilities: Provide analytic support to optimize and develop assigned customer accesses. Conduct research and analysis to develop targets of interest and analytic strategies. Identify target communications within the global network. Utilize your expertise in data and voice communications, including DNR (voice/FAX), DNI, and advanced technologies over IP. Apply critical thinking and reasoning to make analytic determinations. Leverage your knowledge of various technologies and topics to identify analytic vectors. Exploit foreign communications and communication systems to collect, analyze, process, and disseminate SIGINT information. Use software applications and databases associated with SIGINT target development. Develop techniques and tools for collecting, evaluating, analyzing, documenting, locating, or presenting information. Demonstrate familiarity with SIGINT and collateral report repositories and incorporate independent research to enhance target development. Provide guidance to LEVEL 1 and LEVEL 2 contractor personnel involved with SIGINT development. Offer SIGDEV support to optimize and develop accesses. Must-Have Skills: 10 years of experience in SIGINT Development analytical support. Expertise in DNI/DNR collection and dataflow. Proficiency in detailed protocol analysis. Experience with Midas-based tools. Graduate of Military COMINT Signals Analyst Program (MCSAP), Military Signals Analyst Program (MSAP), Signals Analyst Development Program (SADP), and Military Cryptologic Continuing Education Program - Signals Analysis (MCCEP-SA). Active TS/SCI with Full Scope Polygraph. Why Join Us? Be part of a forward-thinking team that values innovation and excellence. Work on exciting projects that make a real impact. Collaborate with talented professionals in a supportive and dynamic environment. Enjoy opportunities for professional growth and development. If you're ready to take on this exciting challenge and make a difference, apply now and become a key player in our team! Interested in hearing more? Easy Apply now by clicking the "Apply" button. Jobot is an Equal Opportunity Employer. We provide an inclusive work environment that celebrates diversity and all qualified candidates receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, age (40 and over), disability, military status, genetic information or any other basis protected by applicable federal, state, or local laws. Jobot also prohibits harassment of applicants or employees based on any of these protected categories. It is Jobot's policy to comply with all applicable federal, state and local laws respecting consideration of unemployment status in making hiring decisions. Sometimes Jobot is required to perform background checks with your authorization. Jobot will consider qualified candidates with criminal histories in a manner consistent with any applicable federal, state, or local law regarding criminal backgrounds, including but not limited to the Los Angeles Fair Chance Initiative for Hiring and the San Francisco Fair Chance Ordinance. Information collected and processed as part of your Jobot candidate profile, and any job applications, resumes, or other information you choose to submit is subject to Jobot's Privacy Policy, as well as the Jobot California Worker Privacy Notice and Jobot Notice Regarding Automated Employment Decision Tools which are available at By applying for this job, you agree to receive calls, AI-generated calls, text messages, or emails from Jobot, and/or its agents and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here:
03/16/2026
Full time
We take Work-Life-Balance seriously! This Jobot Job is hosted by: Madeline Lazarus Are you a fit? Easy Apply now by clicking the "Apply" button and sending us your resume. Salary: $100,000 - $150,000 per year A bit about us: We work on challenging problems, and our work has a high impact We are a small business that provides Information Technology, Cybersecurity, and Software Engineering to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape. Why join us? We pride ourselves on offering Work-Life-Balance Competitive Salaries Excellent Benefits We offer Stability Great Mentorship We are family-centric We make sure you are paired up to work with like-minded colleagues Job Details Join Our Team as a Senior SIGINT Development Analyst! Are you ready to take your career to the next level? We are seeking a dynamic and experienced Senior SIGINT Development Analyst to join our innovative team. If you have a passion for cutting-edge technology and a knack for analytical thinking, this is the perfect opportunity for you! What You'll Be Doing: As a Senior SIGINT Development Analyst, you will play a crucial role in optimizing and developing customer accesses. Your responsibilities will include conducting in-depth research and analysis of collection and collateral data to develop targets of interest and create analytic strategies. You will identify target communications within the global network, focusing on data and voice communications, including DNR (voice/FAX), DNI, and other advanced technologies over IP. Key Responsibilities: Provide analytic support to optimize and develop assigned customer accesses. Conduct research and analysis to develop targets of interest and analytic strategies. Identify target communications within the global network. Utilize your expertise in data and voice communications, including DNR (voice/FAX), DNI, and advanced technologies over IP. Apply critical thinking and reasoning to make analytic determinations. Leverage your knowledge of various technologies and topics to identify analytic vectors. Exploit foreign communications and communication systems to collect, analyze, process, and disseminate SIGINT information. Use software applications and databases associated with SIGINT target development. Develop techniques and tools for collecting, evaluating, analyzing, documenting, locating, or presenting information. Demonstrate familiarity with SIGINT and collateral report repositories and incorporate independent research to enhance target development. Provide guidance to LEVEL 1 and LEVEL 2 contractor personnel involved with SIGINT development. Offer SIGDEV support to optimize and develop accesses. Must-Have Skills: 10 years of experience in SIGINT Development analytical support. Expertise in DNI/DNR collection and dataflow. Proficiency in detailed protocol analysis. Experience with Midas-based tools. Graduate of Military COMINT Signals Analyst Program (MCSAP), Military Signals Analyst Program (MSAP), Signals Analyst Development Program (SADP), and Military Cryptologic Continuing Education Program - Signals Analysis (MCCEP-SA). Active TS/SCI with Full Scope Polygraph. Why Join Us? Be part of a forward-thinking team that values innovation and excellence. Work on exciting projects that make a real impact. Collaborate with talented professionals in a supportive and dynamic environment. Enjoy opportunities for professional growth and development. If you're ready to take on this exciting challenge and make a difference, apply now and become a key player in our team! Interested in hearing more? Easy Apply now by clicking the "Apply" button. Jobot is an Equal Opportunity Employer. We provide an inclusive work environment that celebrates diversity and all qualified candidates receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, age (40 and over), disability, military status, genetic information or any other basis protected by applicable federal, state, or local laws. Jobot also prohibits harassment of applicants or employees based on any of these protected categories. It is Jobot's policy to comply with all applicable federal, state and local laws respecting consideration of unemployment status in making hiring decisions. Sometimes Jobot is required to perform background checks with your authorization. Jobot will consider qualified candidates with criminal histories in a manner consistent with any applicable federal, state, or local law regarding criminal backgrounds, including but not limited to the Los Angeles Fair Chance Initiative for Hiring and the San Francisco Fair Chance Ordinance. Information collected and processed as part of your Jobot candidate profile, and any job applications, resumes, or other information you choose to submit is subject to Jobot's Privacy Policy, as well as the Jobot California Worker Privacy Notice and Jobot Notice Regarding Automated Employment Decision Tools which are available at By applying for this job, you agree to receive calls, AI-generated calls, text messages, or emails from Jobot, and/or its agents and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here:
POSITION SUMMARY: The Cybersecurity Analyst is responsible for safeguarding the Corporation's data, systems, and cybersecurity posture. This includes managing endpoint security solutions, protecting cloud environments (e.g., Microsoft 365 and Microsoft Azure), and overseeing key security tools and capabilities. The Analyst develops and maintains cybersecurity policies, architectures, and standards to ensure compliance with industry regulations and best practices. The role monitors emerging threats, responds to security incidents, and conducts investigations to mitigate vulnerabilities. Cybersecurity Analysts implement data classification frameworks, enforce secure handling of sensitive information, and manage encryption protocols. They deploy and optimize cybersecurity tools, manage threat intelligence platforms, and proactively address risks to ensure organizational resilience. This position requires strong analytical skills, technical expertise, and the ability to collaborate across teams to maintain a secure IT environment. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, RUS, OSHA, SOX, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. JOB DUTIES/ESSENTIAL FUNCTIONS Endpoint Security Management:Manage endpoint detection and response (EDR) solutions and ensure optimal configuration and operation across corporate systems. Monitor and respond to endpoint threats, implement remediation measures, and maintain system integrity. Cloud Security Management:Design, implement, and maintain cloud security solutions, focusing on platforms such as Microsoft 365 and Microsoft Azure. Ensure secure configurations, monitor cloud environments for potential threats, manage access controls, and safeguard cloud-based resources. Data Protection and Classification:Develop and implement data protection strategies, including encryption, secure storage, and access control measures. Establish and maintain data classification frameworks to ensure sensitive information is securely handled and complies with regulatory requirements. Threat Intelligence, Incident Response, and Investigation:Monitor emerging threats and maintain situational awareness through threat intelligence platforms. Respond to security incidents by investigating root causes, analyzing attack vectors, and documenting findings. Collaborate with teams on mitigation strategies to prevent recurrence and improve overall security posture. Cybersecurity Tools Management:Deploy, configure, and maintain cybersecurity tools and capabilities, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, vulnerability management platforms, and other security solutions. Monitor tool efficacy and update configurations as needed. Policy, Architecture, and Standards Development:Establish, review, and update cybersecurity policies, architectures, and standards to align with industry best practices and regulations. Collaborate with stakeholders to ensure policies are actionable and effectively implemented across the organization. REQUIRED QUALIFICATIONS Education: A Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, Engineering, Information Systems, or a related field from an accredited college or university. Cybersecurity Analyst III Experience: Minimum of 4 years in managing cybersecurity tools, implementing secure cloud configurations, leading data protection strategies, and conducting security investigations. Equivalent Experience: Minimum of 8 years of relevant experience may also be considered. Responsibility: Independently manages endpoint and cloud security systems, leads data protection initiatives, investigates security incidents, and contributes to threat intelligence monitoring and policy development. Cybersecurity Analyst IV Experience: Minimum of 6 years in designing and managing cybersecurity systems, implementing secure cloud strategies, developing data protection measures, and proactively using threat intelligence. Equivalent Experience: Minimum of 10 years of relevant experience may also be considered. Responsibility: Leads projects for the implementation of advanced cybersecurity tools and solutions, focusing on cloud security for Microsoft Azure and Microsoft 365. Investigates complex incidents, analyzes threat intelligence, and develops detailed policies and standards. Provides technical expertise across the IT function. Cybersecurity Analyst V Experience: Minimum of 8 years in architecting and managing cybersecurity tools, implementing secure cloud strategies, overseeing enterprise-wide data protection measures, and leading incident response efforts. Equivalent Experience: Minimum of 12 years of relevant experience may also be considered. Responsibility: Oversees major projects involving cybersecurity architecture, cloud security tool implementation, and compliance strategies. Provides leadership in incident response, threat intelligence integration, and enterprise security policy development. Licenses, Certifications and/or Registrations: Relevant certificationsare a plus: Certified Information Systems Security Professional (CISSP) CompTIA Security+ Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Cybersecurity Architect Expert GIAC Certified Incident Handler (GCIH) GIAC Security Essentials Certification (GSEC) Certified Ethical Hacker (CEH) ITIL Foundation Specialized Skills (e.g., typing, computers, software, tools and equipment uses, etc.): Technical Expertise: Proficiencyin endpoint security solutions (e.g., EDR, antivirus, DLP). Strong knowledge of cloud security principles, especially forMicrosoft 365 and Microsoft Azure. Experience with cybersecurity tools such as SIEM platforms, vulnerability management systems, and IDS/IPS tools. Familiarity with data encryption, secure storage solutions, and access control mechanisms. Understanding ofthreat intelligence platforms and proactive risk management strategies. Security In-depth understanding of cybersecurity frameworks (e.g., NIST CSF, ISO 27001) and regulatory requirements (e.g., NERC CIP, SOX). Expertise inincident response processes and forensic investigation techniques. Knowledge of advanced security architectures, policies, and standards. Soft Skills: Excellent problem-solving/analyticalskills and attention to detail. Good oral and written communication and interpersonal skills. Excellent customer service focus and positive attitude. Ability to work independently and as part of a team.
03/01/2026
Full time
POSITION SUMMARY: The Cybersecurity Analyst is responsible for safeguarding the Corporation's data, systems, and cybersecurity posture. This includes managing endpoint security solutions, protecting cloud environments (e.g., Microsoft 365 and Microsoft Azure), and overseeing key security tools and capabilities. The Analyst develops and maintains cybersecurity policies, architectures, and standards to ensure compliance with industry regulations and best practices. The role monitors emerging threats, responds to security incidents, and conducts investigations to mitigate vulnerabilities. Cybersecurity Analysts implement data classification frameworks, enforce secure handling of sensitive information, and manage encryption protocols. They deploy and optimize cybersecurity tools, manage threat intelligence platforms, and proactively address risks to ensure organizational resilience. This position requires strong analytical skills, technical expertise, and the ability to collaborate across teams to maintain a secure IT environment. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, RUS, OSHA, SOX, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. JOB DUTIES/ESSENTIAL FUNCTIONS Endpoint Security Management:Manage endpoint detection and response (EDR) solutions and ensure optimal configuration and operation across corporate systems. Monitor and respond to endpoint threats, implement remediation measures, and maintain system integrity. Cloud Security Management:Design, implement, and maintain cloud security solutions, focusing on platforms such as Microsoft 365 and Microsoft Azure. Ensure secure configurations, monitor cloud environments for potential threats, manage access controls, and safeguard cloud-based resources. Data Protection and Classification:Develop and implement data protection strategies, including encryption, secure storage, and access control measures. Establish and maintain data classification frameworks to ensure sensitive information is securely handled and complies with regulatory requirements. Threat Intelligence, Incident Response, and Investigation:Monitor emerging threats and maintain situational awareness through threat intelligence platforms. Respond to security incidents by investigating root causes, analyzing attack vectors, and documenting findings. Collaborate with teams on mitigation strategies to prevent recurrence and improve overall security posture. Cybersecurity Tools Management:Deploy, configure, and maintain cybersecurity tools and capabilities, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, vulnerability management platforms, and other security solutions. Monitor tool efficacy and update configurations as needed. Policy, Architecture, and Standards Development:Establish, review, and update cybersecurity policies, architectures, and standards to align with industry best practices and regulations. Collaborate with stakeholders to ensure policies are actionable and effectively implemented across the organization. REQUIRED QUALIFICATIONS Education: A Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, Engineering, Information Systems, or a related field from an accredited college or university. Cybersecurity Analyst III Experience: Minimum of 4 years in managing cybersecurity tools, implementing secure cloud configurations, leading data protection strategies, and conducting security investigations. Equivalent Experience: Minimum of 8 years of relevant experience may also be considered. Responsibility: Independently manages endpoint and cloud security systems, leads data protection initiatives, investigates security incidents, and contributes to threat intelligence monitoring and policy development. Cybersecurity Analyst IV Experience: Minimum of 6 years in designing and managing cybersecurity systems, implementing secure cloud strategies, developing data protection measures, and proactively using threat intelligence. Equivalent Experience: Minimum of 10 years of relevant experience may also be considered. Responsibility: Leads projects for the implementation of advanced cybersecurity tools and solutions, focusing on cloud security for Microsoft Azure and Microsoft 365. Investigates complex incidents, analyzes threat intelligence, and develops detailed policies and standards. Provides technical expertise across the IT function. Cybersecurity Analyst V Experience: Minimum of 8 years in architecting and managing cybersecurity tools, implementing secure cloud strategies, overseeing enterprise-wide data protection measures, and leading incident response efforts. Equivalent Experience: Minimum of 12 years of relevant experience may also be considered. Responsibility: Oversees major projects involving cybersecurity architecture, cloud security tool implementation, and compliance strategies. Provides leadership in incident response, threat intelligence integration, and enterprise security policy development. Licenses, Certifications and/or Registrations: Relevant certificationsare a plus: Certified Information Systems Security Professional (CISSP) CompTIA Security+ Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Cybersecurity Architect Expert GIAC Certified Incident Handler (GCIH) GIAC Security Essentials Certification (GSEC) Certified Ethical Hacker (CEH) ITIL Foundation Specialized Skills (e.g., typing, computers, software, tools and equipment uses, etc.): Technical Expertise: Proficiencyin endpoint security solutions (e.g., EDR, antivirus, DLP). Strong knowledge of cloud security principles, especially forMicrosoft 365 and Microsoft Azure. Experience with cybersecurity tools such as SIEM platforms, vulnerability management systems, and IDS/IPS tools. Familiarity with data encryption, secure storage solutions, and access control mechanisms. Understanding ofthreat intelligence platforms and proactive risk management strategies. Security In-depth understanding of cybersecurity frameworks (e.g., NIST CSF, ISO 27001) and regulatory requirements (e.g., NERC CIP, SOX). Expertise inincident response processes and forensic investigation techniques. Knowledge of advanced security architectures, policies, and standards. Soft Skills: Excellent problem-solving/analyticalskills and attention to detail. Good oral and written communication and interpersonal skills. Excellent customer service focus and positive attitude. Ability to work independently and as part of a team.
Salary Range: $70,304 - $90,300 This position is a hybrid role between an IT Support Analyst and a Junior Systems Administrator for the F/A-18 & EA-18G Integrated Product Team (IPT). The role is primarily responsible for Tier I/II troubleshooting and front-line triage, while providing significant opportunities to support more technical System Administrator tasks and functions as the candidate progresses. Essential Job Functions: Serve as a member of the team responsible for triaging and prioritizing all service calls, walk-ins, emails, and help desk tickets. Provide technical support to all end users, customers, and guests within the IPT. Perform standard account maintenance tasks including creating user accounts through Active Directory (AD), resetting passwords, and performing account unlocks. Assist with the routing of account-related paperwork to the proper personnel. Execute foundational system administrator tasks such as managing file share accounts, adjusting account permissions, and implementing assigned Change Requests (CRs). Support the deployment of IT assets and provide desktop/application troubleshooting to ensure mission-critical hardware remains operational. Support, implement, and comply with cybersecurity requirements and controls. Identify and manage relevant IT/Cybersecurity infrastructure components and documentation. Provide technical support for all VTC systems used throughout the IPT and assist with technical implementation for organizational projects and services. Coordinate activities with IT Management, stakeholders, and other technical teams. Work cross-functionally to achieve the IPT's mission and maintain operational uptime. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. High school diploma plus 10 years of experience or an Associates degree with four years experience. Must be able to be granted a security clearance and maintain one for the duration of employment. Teachable, positive attitude, highly motivated, and team oriented. Ability to perform, manage, and prioritize multiple related tasks in a time-sensitive environment. Effectively communicate (oral and written) with tact and professionalism. Detail-oriented with strong organizational skills. Must be able to work onsite - This position is not remote work eligible. Windows Operating System and Security+ or other certifications required to comply with DoD 8140. Must be willing and able to work after hours/weekend support for patching and maintenance as needed. Possess professionalism, courtesy, high moral character, and integrity. Desired Skills: Expertise with Atlassian products such as Jira, Service Desk, and Wiki.
03/01/2026
Full time
Salary Range: $70,304 - $90,300 This position is a hybrid role between an IT Support Analyst and a Junior Systems Administrator for the F/A-18 & EA-18G Integrated Product Team (IPT). The role is primarily responsible for Tier I/II troubleshooting and front-line triage, while providing significant opportunities to support more technical System Administrator tasks and functions as the candidate progresses. Essential Job Functions: Serve as a member of the team responsible for triaging and prioritizing all service calls, walk-ins, emails, and help desk tickets. Provide technical support to all end users, customers, and guests within the IPT. Perform standard account maintenance tasks including creating user accounts through Active Directory (AD), resetting passwords, and performing account unlocks. Assist with the routing of account-related paperwork to the proper personnel. Execute foundational system administrator tasks such as managing file share accounts, adjusting account permissions, and implementing assigned Change Requests (CRs). Support the deployment of IT assets and provide desktop/application troubleshooting to ensure mission-critical hardware remains operational. Support, implement, and comply with cybersecurity requirements and controls. Identify and manage relevant IT/Cybersecurity infrastructure components and documentation. Provide technical support for all VTC systems used throughout the IPT and assist with technical implementation for organizational projects and services. Coordinate activities with IT Management, stakeholders, and other technical teams. Work cross-functionally to achieve the IPT's mission and maintain operational uptime. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. High school diploma plus 10 years of experience or an Associates degree with four years experience. Must be able to be granted a security clearance and maintain one for the duration of employment. Teachable, positive attitude, highly motivated, and team oriented. Ability to perform, manage, and prioritize multiple related tasks in a time-sensitive environment. Effectively communicate (oral and written) with tact and professionalism. Detail-oriented with strong organizational skills. Must be able to work onsite - This position is not remote work eligible. Windows Operating System and Security+ or other certifications required to comply with DoD 8140. Must be willing and able to work after hours/weekend support for patching and maintenance as needed. Possess professionalism, courtesy, high moral character, and integrity. Desired Skills: Expertise with Atlassian products such as Jira, Service Desk, and Wiki.
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
03/01/2026
Full time
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
Job Title: Cyber Security Analyst, Data Security and Awareness Location: Kennesaw, Georgia Regular/Temporary: Regular Full/Part Time: Full-Time Job ID: 293707 About Us Are you ready to transform lives through academic excellence, innovative research, strong community partnerships and economic opportunity? Do you want to cultivate an inclusive environment that encourages free expression and civil discourse? Kennesaw State University is one of the 50 largest public institutions in the country. With growing enrollment and global reach, we continue to expand our institutional influence and prominence beyond the state of Georgia. We offer more than 190 undergraduate, graduate, and doctoral degrees to empower our 47,000 students to become thought leaders, lifelong learners, and informed global citizens. Our entrepreneurial spirit, high-impact research, and Division I athletics draw students from throughout the region and from more than 100 countries across the globe. Our university's vibrant culture, career opportunities, rich benefits, and values of respect, integrity, collaboration, inclusivity, and accountability make us an employer of choice. We are part of the University System of Georgia . We are searching for talented people to join Kennesaw State University in our vision . Come Take Flight at KSU! Location (Primary Location for Job Responsibilities) Our Kennesaw campus is located at 1000 Chastain Road NW, Kennesaw, GA 30144. Our Marietta campus is located at 1100 South Marietta Parkway, Marietta, GA 30060. Department Information DEPARTMENT SPECIFIC TASKS AND RESPONSIBILITIES: 1.Collaborates with cybersecurity data security and awareness team members to triage, investigate, and resolve services tickets related to data security alerts, compromised accounts, security awareness incidents, and other data security issues 2.Collaborates with team members to improve security posture by supporting enhancements to KnowBe4, Microsoft Purview DLP, or similar programs policies, and processes for identifying, analyzing, and remediating compromised accounts 3.Assists with designing, coordinating, and delivering cybersecurity awareness campaigns to educate faculty, staff, and students on secure behaviors, institutional policies, and data protection best practices DEPARTMENT SPECIFIC KNOWLEDGE, SKILLS, AND ABILITIES : Working knowledge of Microsoft Purview DLP, Microsoft 365 security features, and security awareness platforms (e.g., KnowBe4) Hands-on experience with KnowBe4, Microsoft Purview DLP, and ServiceNow to support security operations, ticket management, and incident response activities Able to interpret alerts, analyze trends, and support risk-based improvements Able to collaborate effectively with cybersecurity team members and campus stakeholders, communicate security concepts to non-technical audiences, and support incident responses, ticketing workflows, and awareness initiatives Able to document security incidents, analyze metrics, and support reporting efforts to drive continuous improvement in security posture Able to develop foundational skills in identifying and responding to account compromise incidents, understanding data loss prevention policies, data classification, compliance requirements, and cybersecurity awareness program delivery Job Summary Leverages skills and tools to identify security concerns affecting campus systems. Creates, monitors, and maintains safeguards to ensure the secure option of all systems on campus. Responsibilities KEY RESPONSIBILITIES : 1. Collaborates with stakeholders to resolve computer security incidents and vulnerability compliance 2. Receives and analyzes network alerts from various sources within the enterprise 3. Determines possible causes of security alerts 4. Documents and escalates incidents including event s history, status and potential impact for further action that may cause ongoing and immediate impact to the environment 5. Utilizes cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity Required Qualifications Educational Requirements High School diploma or equivalent Required Experience Two (2) years related Information Technology experience Preferred Qualifications Preferred Educational Qualifications Degree from an accredited institution of higher education in related field preferred Preferred Experience Previous experience in higher education preferred Working knowledge of enterprise security tools, such as M365, ServiceNow, and Data Loss Prevention Previous experience with Security Awareness programs and applications Prior experience with IT support or customer service is a plus Knowledge, Skills, & Abilities ABILITIES Ability to conduct vulnerability scans and recognize vulnerabilities in security systems Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute) Ability to accurately define incidents, problems, and events in the trouble ticketing system Ability to identify systemic security issues based on the analysis of vulnerability and configuration data Able to handle multiple tasks or projects at one time meeting assigned deadlines KNOWLEDGE Knowledge of computer networking concepts, communications, and protocols Knowledge of the common attack vectors on the network layer Knowledge of operating system command-line tools and network tools to identify vulnerabilities Knowledge of operating systems and Database Concepts Knowledge of cyber attackers, adversarial tactics, techniques, and procedures; Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks) Knowledge of regulations pertaining to storage and handling of confidential data, to include PII, PCI, HIPPA, FERPA, etc. Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools, technologies and applications SKILLS Skilled in recognizing and categorizing types of vulnerabilities and associated attacks Skilled in identifying hidden patterns or relationships Skilled in reviewing logs to identify evidence of past intrusions Skilled in performing root cause analysis Excellent interpersonal, initiative, teamwork, problem solving, independent judgment, organization, communication (verbal and written), time management, project management and presentation skills Proficient with computer applications and programs associated with the position (i.e. Microsoft Office suite and other required applications) Strong attention to detail and follow up skills Strong customer service skills and phone and e-mail etiquette USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at . Equal Employment Opportunity Kennesaw State University is an Equal Employment Opportunity Employer. The University is committed to maintaining a fair and respectful environment for living, work and study. To that end, and in accordance with federal and state law, Board of Regents policy, and University policy, the University prohibits harassment of or discrimination against any person because of race, color, sex (including sexual harassment, pregnancy, and medical conditions related to pregnancy), sexual orientation, gender identity, gender expression, ethnicity or national origin, religion, age, genetic information, disability, or veteran or military status by any member of the KSU Community on campus, in connection with a University program or activity, or in a manner that creates a hostile environment for members of the KSU community. For additional information on this policy, or to file a complaint under the provisions of this policy, students, employees, applicants for employment or admission or other third parties should contact the Office of Institutional Equity at English Building, Suite 225, . Other Information This is not a supervisory position. This position does not have any financial responsibilities. This position will not be required to drive. This role is considered a position of trust. This position does not require a purchasing card (P-Card). This position may travel 1% - 24% of the time This position does not require security clearance. Background Check Standard Enhanced Per the University System of Georgia background check policy, all final candidates will be required to consent to a criminal background investigation. Final candidates may be asked to disclose criminal record history during the initial screening process and prior to a conditional offer of employment. Applicants for positions of trust with screening . click apply for full job details
01/14/2026
Full time
Job Title: Cyber Security Analyst, Data Security and Awareness Location: Kennesaw, Georgia Regular/Temporary: Regular Full/Part Time: Full-Time Job ID: 293707 About Us Are you ready to transform lives through academic excellence, innovative research, strong community partnerships and economic opportunity? Do you want to cultivate an inclusive environment that encourages free expression and civil discourse? Kennesaw State University is one of the 50 largest public institutions in the country. With growing enrollment and global reach, we continue to expand our institutional influence and prominence beyond the state of Georgia. We offer more than 190 undergraduate, graduate, and doctoral degrees to empower our 47,000 students to become thought leaders, lifelong learners, and informed global citizens. Our entrepreneurial spirit, high-impact research, and Division I athletics draw students from throughout the region and from more than 100 countries across the globe. Our university's vibrant culture, career opportunities, rich benefits, and values of respect, integrity, collaboration, inclusivity, and accountability make us an employer of choice. We are part of the University System of Georgia . We are searching for talented people to join Kennesaw State University in our vision . Come Take Flight at KSU! Location (Primary Location for Job Responsibilities) Our Kennesaw campus is located at 1000 Chastain Road NW, Kennesaw, GA 30144. Our Marietta campus is located at 1100 South Marietta Parkway, Marietta, GA 30060. Department Information DEPARTMENT SPECIFIC TASKS AND RESPONSIBILITIES: 1.Collaborates with cybersecurity data security and awareness team members to triage, investigate, and resolve services tickets related to data security alerts, compromised accounts, security awareness incidents, and other data security issues 2.Collaborates with team members to improve security posture by supporting enhancements to KnowBe4, Microsoft Purview DLP, or similar programs policies, and processes for identifying, analyzing, and remediating compromised accounts 3.Assists with designing, coordinating, and delivering cybersecurity awareness campaigns to educate faculty, staff, and students on secure behaviors, institutional policies, and data protection best practices DEPARTMENT SPECIFIC KNOWLEDGE, SKILLS, AND ABILITIES : Working knowledge of Microsoft Purview DLP, Microsoft 365 security features, and security awareness platforms (e.g., KnowBe4) Hands-on experience with KnowBe4, Microsoft Purview DLP, and ServiceNow to support security operations, ticket management, and incident response activities Able to interpret alerts, analyze trends, and support risk-based improvements Able to collaborate effectively with cybersecurity team members and campus stakeholders, communicate security concepts to non-technical audiences, and support incident responses, ticketing workflows, and awareness initiatives Able to document security incidents, analyze metrics, and support reporting efforts to drive continuous improvement in security posture Able to develop foundational skills in identifying and responding to account compromise incidents, understanding data loss prevention policies, data classification, compliance requirements, and cybersecurity awareness program delivery Job Summary Leverages skills and tools to identify security concerns affecting campus systems. Creates, monitors, and maintains safeguards to ensure the secure option of all systems on campus. Responsibilities KEY RESPONSIBILITIES : 1. Collaborates with stakeholders to resolve computer security incidents and vulnerability compliance 2. Receives and analyzes network alerts from various sources within the enterprise 3. Determines possible causes of security alerts 4. Documents and escalates incidents including event s history, status and potential impact for further action that may cause ongoing and immediate impact to the environment 5. Utilizes cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity Required Qualifications Educational Requirements High School diploma or equivalent Required Experience Two (2) years related Information Technology experience Preferred Qualifications Preferred Educational Qualifications Degree from an accredited institution of higher education in related field preferred Preferred Experience Previous experience in higher education preferred Working knowledge of enterprise security tools, such as M365, ServiceNow, and Data Loss Prevention Previous experience with Security Awareness programs and applications Prior experience with IT support or customer service is a plus Knowledge, Skills, & Abilities ABILITIES Ability to conduct vulnerability scans and recognize vulnerabilities in security systems Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute) Ability to accurately define incidents, problems, and events in the trouble ticketing system Ability to identify systemic security issues based on the analysis of vulnerability and configuration data Able to handle multiple tasks or projects at one time meeting assigned deadlines KNOWLEDGE Knowledge of computer networking concepts, communications, and protocols Knowledge of the common attack vectors on the network layer Knowledge of operating system command-line tools and network tools to identify vulnerabilities Knowledge of operating systems and Database Concepts Knowledge of cyber attackers, adversarial tactics, techniques, and procedures; Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks) Knowledge of regulations pertaining to storage and handling of confidential data, to include PII, PCI, HIPPA, FERPA, etc. Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools, technologies and applications SKILLS Skilled in recognizing and categorizing types of vulnerabilities and associated attacks Skilled in identifying hidden patterns or relationships Skilled in reviewing logs to identify evidence of past intrusions Skilled in performing root cause analysis Excellent interpersonal, initiative, teamwork, problem solving, independent judgment, organization, communication (verbal and written), time management, project management and presentation skills Proficient with computer applications and programs associated with the position (i.e. Microsoft Office suite and other required applications) Strong attention to detail and follow up skills Strong customer service skills and phone and e-mail etiquette USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at . Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at . Equal Employment Opportunity Kennesaw State University is an Equal Employment Opportunity Employer. The University is committed to maintaining a fair and respectful environment for living, work and study. To that end, and in accordance with federal and state law, Board of Regents policy, and University policy, the University prohibits harassment of or discrimination against any person because of race, color, sex (including sexual harassment, pregnancy, and medical conditions related to pregnancy), sexual orientation, gender identity, gender expression, ethnicity or national origin, religion, age, genetic information, disability, or veteran or military status by any member of the KSU Community on campus, in connection with a University program or activity, or in a manner that creates a hostile environment for members of the KSU community. For additional information on this policy, or to file a complaint under the provisions of this policy, students, employees, applicants for employment or admission or other third parties should contact the Office of Institutional Equity at English Building, Suite 225, . Other Information This is not a supervisory position. This position does not have any financial responsibilities. This position will not be required to drive. This role is considered a position of trust. This position does not require a purchasing card (P-Card). This position may travel 1% - 24% of the time This position does not require security clearance. Background Check Standard Enhanced Per the University System of Georgia background check policy, all final candidates will be required to consent to a criminal background investigation. Final candidates may be asked to disclose criminal record history during the initial screening process and prior to a conditional offer of employment. Applicants for positions of trust with screening . click apply for full job details
Systems Analyst 3 Job ID: 279560 Location: Augusta University Full/Part Time: Full Time Regular/Temporary: About Us Augusta University is Georgia's innovation center for education and health care, training the next generation of innovators, leaders, and healthcare providers in classrooms and clinics on four campuses in Augusta and locations across the state. More than 10,500 students choose Augusta for educational opportunities at the center of Georgia's cybersecurity hub and experiential learning that blends arts and application, humanities, and the health sciences. Augusta is home to Georgia's only public academic health center, where groundbreaking research is creating a healthier, more prosperous Georgia, and world-class clinicians are bringing the medicine of tomorrow to patient care today. Our mission and values make Augusta University an institution like no other. Augusta University's distinct characteristics in education and research include real-world experiences and community engagement, as well as a culture of building community, corporate and government partnerships that address health, security, economic and societal concerns locally and across the state. The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Location Augusta University- Our Health Sciences Campus: th Street, Augusta, GA 30912 College/Department Information The Division of Information Technology aims to deliver innovative, reliable, and secure services to support students, educators, clinicians, researchers, and administrators. As Augusta University's central IT provider, we manage essential IT resources such as the wired and wireless network, email, telephony, online collaboration tools, information security, software licensing, websites, and various other systems and applications. Job Summary This position analyzes, implements, and modifies application systems with responsibilities for planning, programming, testing, debugging, and deploying, within established standards, to support the organization's application systems in database, client-server, and internet environments. The incumbent consults with business systems analysts, other systems analysts, and/or users to identify functional and technical requirements. The incumbent acts as the project manager for moderately complex projects by directing the activities of more junior level systems analysts or coordinating activities with other technical teams and may assist business systems analysts with specifications and development of documentation that describes application deployment and operating procedures. Responsibilities The duties include, but are not limited to: ANALYZE PROBLEMS: Analyze business, academic, and research problems and application programming requests as they relate to identity management set-up and integration; develop scope, objectives, and cost benefit analyses for use in determining accepted programming requests; develop project plans for moderately complex systems including task definitions, costs, and time estimates. PROGRAM, TEST, AND DOCUMENT: Program, test, and document systems according to team standards in order to minimize system problems and assure quality control. Follow established change enablement processes to deploy application additions and modifications to production environments. PROJECTS: Assist on the management/oversight of assigned projects and technical staff engaged in system design, development, and maintenance activities; act as a project manager of large cross- departmental projects as needed. TRAINING: Mentor and assist with training technical personnel in ITS and institution-wide, ensuring technical personnel/users possess required knowledge of system applications, standards, operations, and capabilities. DOCUMENTATION: Work with business systems analysts to document system specifications sufficient to timely development and implementation of application systems and modifications. Participate in fit-gap studies, reviews of functional requirements, system design, program specifications, test plans, and test results in accordance with established standards. Participate in data governance activities relative to documentation of technical definitions and specifications. ADVISE: Advise internal and external system support personnel in the diagnosis and correction of system problems. Advise on application system upgrades and enhancements. OTHER DUTIES: Perform other duties as assigned. Required Qualifications Bachelor's degree from an accredited college or university in Information Technology or related field of study with seven years' experience in a relevant field of work including five years combination of high-level programming and systems analysis and design including a minimum of two years of programming. OR Associate's degree from an accredited college or university in Information Technology or related field of study with ten years' experience in a relevant field of work including six years combination of high-level programming and systems analysis and design including a minimum of three years of programming. Knowledge, Skills, & Abilities KNOWLEDGE Knowledge of all phases of the project development cycle project management tools and documentation needs and techniques Knowledge of structured systems methodologies, data mapping techniques, and of a broad range of relevant multi-user applications SKILLS Excellent interpersonal, written, and verbal communication skills ABILITIES Ability to maintain confidentiality Proven ability to communicate effectively verbally, in writing, and through formal presentations at the technical and non-technical level Proven ability to develop an effective, collaborative working relationship with a variety of representative groups with potentially dissimilar priorities Ability to design, conduct, and evaluate systems testing with a focus on IDM integrations; research and evaluate the suitability of application software and hardware products Ability to design, develop, and implement integrated application systems solutions to organizational requirements using relational database client-server, and internet technologies with knowledge and experience specifically focused on identity management and methodologies and solutions instructions. Shift/Salary/Benefits Shift: Days/M-F (Work outside of normal business hours may be required) Pay Band: B15 Salary: $82,800/annually - $94,200/annually Salary to be commensurate with qualifications of the selected candidate within the established range (generally minimum midpoint) of the position. Recruitment Period: Until Filled Augusta University offers a variety of benefits to full-time benefits-eligible employees and some of our half-time (or more) employees. Benefits that may be elected could include health insurance, dental insurance, life insurance, Teachers Retirement System (or Optional Retirement Plan), as well as earned vacation time, sick leave, and 13 paid holidays. Also, our full-time employees who have been employed with us successfully for more than 6 months can be considered for the Tuition Assistance Program. Consider applying with us today! Conditions of Employment All selected candidates are required to successfully pass a Background Check review prior to starting with Augusta University. If applicable for the specific position based on the duties: the candidate will also need to have a credit check completed for Positions of Trust and or approved departmental Purchase Card usage. Motor vehicle reports are required for positions that are required to drive an Augusta University vehicle. For Faculty Hires: Final candidates will be required to provide proof of completed academic degree(s) as well as post-secondary coursework in the form of original transcript(s). Those candidates trained by a foreign institution will also be required to provide an educational/credential evaluation. All employees are responsible for ensuring the confidentiality, availability, and integrity of sensitive patient, student, employee, financial, business, etc. information by exercising sound judgment and adhering to cybersecurity and privacy policies during their employment and beyond. Other Information This position is also responsible for promoting a customer-friendly environment and providing superior service to our patients, students, faculty, and employees. "Augusta University is a patient-and family-centered care institution . click apply for full job details
01/14/2026
Full time
Systems Analyst 3 Job ID: 279560 Location: Augusta University Full/Part Time: Full Time Regular/Temporary: About Us Augusta University is Georgia's innovation center for education and health care, training the next generation of innovators, leaders, and healthcare providers in classrooms and clinics on four campuses in Augusta and locations across the state. More than 10,500 students choose Augusta for educational opportunities at the center of Georgia's cybersecurity hub and experiential learning that blends arts and application, humanities, and the health sciences. Augusta is home to Georgia's only public academic health center, where groundbreaking research is creating a healthier, more prosperous Georgia, and world-class clinicians are bringing the medicine of tomorrow to patient care today. Our mission and values make Augusta University an institution like no other. Augusta University's distinct characteristics in education and research include real-world experiences and community engagement, as well as a culture of building community, corporate and government partnerships that address health, security, economic and societal concerns locally and across the state. The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Location Augusta University- Our Health Sciences Campus: th Street, Augusta, GA 30912 College/Department Information The Division of Information Technology aims to deliver innovative, reliable, and secure services to support students, educators, clinicians, researchers, and administrators. As Augusta University's central IT provider, we manage essential IT resources such as the wired and wireless network, email, telephony, online collaboration tools, information security, software licensing, websites, and various other systems and applications. Job Summary This position analyzes, implements, and modifies application systems with responsibilities for planning, programming, testing, debugging, and deploying, within established standards, to support the organization's application systems in database, client-server, and internet environments. The incumbent consults with business systems analysts, other systems analysts, and/or users to identify functional and technical requirements. The incumbent acts as the project manager for moderately complex projects by directing the activities of more junior level systems analysts or coordinating activities with other technical teams and may assist business systems analysts with specifications and development of documentation that describes application deployment and operating procedures. Responsibilities The duties include, but are not limited to: ANALYZE PROBLEMS: Analyze business, academic, and research problems and application programming requests as they relate to identity management set-up and integration; develop scope, objectives, and cost benefit analyses for use in determining accepted programming requests; develop project plans for moderately complex systems including task definitions, costs, and time estimates. PROGRAM, TEST, AND DOCUMENT: Program, test, and document systems according to team standards in order to minimize system problems and assure quality control. Follow established change enablement processes to deploy application additions and modifications to production environments. PROJECTS: Assist on the management/oversight of assigned projects and technical staff engaged in system design, development, and maintenance activities; act as a project manager of large cross- departmental projects as needed. TRAINING: Mentor and assist with training technical personnel in ITS and institution-wide, ensuring technical personnel/users possess required knowledge of system applications, standards, operations, and capabilities. DOCUMENTATION: Work with business systems analysts to document system specifications sufficient to timely development and implementation of application systems and modifications. Participate in fit-gap studies, reviews of functional requirements, system design, program specifications, test plans, and test results in accordance with established standards. Participate in data governance activities relative to documentation of technical definitions and specifications. ADVISE: Advise internal and external system support personnel in the diagnosis and correction of system problems. Advise on application system upgrades and enhancements. OTHER DUTIES: Perform other duties as assigned. Required Qualifications Bachelor's degree from an accredited college or university in Information Technology or related field of study with seven years' experience in a relevant field of work including five years combination of high-level programming and systems analysis and design including a minimum of two years of programming. OR Associate's degree from an accredited college or university in Information Technology or related field of study with ten years' experience in a relevant field of work including six years combination of high-level programming and systems analysis and design including a minimum of three years of programming. Knowledge, Skills, & Abilities KNOWLEDGE Knowledge of all phases of the project development cycle project management tools and documentation needs and techniques Knowledge of structured systems methodologies, data mapping techniques, and of a broad range of relevant multi-user applications SKILLS Excellent interpersonal, written, and verbal communication skills ABILITIES Ability to maintain confidentiality Proven ability to communicate effectively verbally, in writing, and through formal presentations at the technical and non-technical level Proven ability to develop an effective, collaborative working relationship with a variety of representative groups with potentially dissimilar priorities Ability to design, conduct, and evaluate systems testing with a focus on IDM integrations; research and evaluate the suitability of application software and hardware products Ability to design, develop, and implement integrated application systems solutions to organizational requirements using relational database client-server, and internet technologies with knowledge and experience specifically focused on identity management and methodologies and solutions instructions. Shift/Salary/Benefits Shift: Days/M-F (Work outside of normal business hours may be required) Pay Band: B15 Salary: $82,800/annually - $94,200/annually Salary to be commensurate with qualifications of the selected candidate within the established range (generally minimum midpoint) of the position. Recruitment Period: Until Filled Augusta University offers a variety of benefits to full-time benefits-eligible employees and some of our half-time (or more) employees. Benefits that may be elected could include health insurance, dental insurance, life insurance, Teachers Retirement System (or Optional Retirement Plan), as well as earned vacation time, sick leave, and 13 paid holidays. Also, our full-time employees who have been employed with us successfully for more than 6 months can be considered for the Tuition Assistance Program. Consider applying with us today! Conditions of Employment All selected candidates are required to successfully pass a Background Check review prior to starting with Augusta University. If applicable for the specific position based on the duties: the candidate will also need to have a credit check completed for Positions of Trust and or approved departmental Purchase Card usage. Motor vehicle reports are required for positions that are required to drive an Augusta University vehicle. For Faculty Hires: Final candidates will be required to provide proof of completed academic degree(s) as well as post-secondary coursework in the form of original transcript(s). Those candidates trained by a foreign institution will also be required to provide an educational/credential evaluation. All employees are responsible for ensuring the confidentiality, availability, and integrity of sensitive patient, student, employee, financial, business, etc. information by exercising sound judgment and adhering to cybersecurity and privacy policies during their employment and beyond. Other Information This position is also responsible for promoting a customer-friendly environment and providing superior service to our patients, students, faculty, and employees. "Augusta University is a patient-and family-centered care institution . click apply for full job details
Primary Location:3452 Spur 399, McKinney, Texas, 75069We are searching for candidates that meet the required qualifications and experience and are able to perform the essential duties and responsibilities.Job Summary:Responsible to prepare and deliver coursework in engaging, innovative, and discipline-appropriate ways that reflect a commitment to the college's core values, an understanding of culturally responsive teaching, and knowledge of the teaching field. Meet professional standards for faculty in accordance with college policies and procedures.Required Qualifications: Essential Duties and Responsibilities Teach courses in accordance with the schedule of classes and follow the approved course descriptions and syllabi established by the Division faculty and administered by the associate dean/director. Teaching assignments may be on one or more of the college's campuses or off-site locations and may include evening and weekend programs. Collin College is not hiring for on-line instruction at this time. May include Dual Credit courses. Supplemental Functions Perform other duties as assigned. Perform all duties and maintain all standards in accordance with college policies, procedures and core values. Physical Demands, Working Conditions and Physical Effort Sedentary Work - Exerting up to 10 pounds of force occasionally, a negligible amount of force frequently, and/or constantly having to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met. Positions in this class typically include talking, hearing, seeing, grasping, standing, walking and repetitive motions, plus stooping, kneeling, crouching, and reaching. Relatively free from unpleasant environmental conditions or hazards. Office environment. Little physical effort required. Requirements Master's of Science degree in Cybersecurity from an accredited institution. Academic preparation in the teaching field to include eighteen (18) semester hours in the discipline to be taught. Teaching experience is desired. Licenses and Certifications are desired. Preferred Licenses and Certifications Current industry certifications from security organizations (for example CISSP, GIAC certifications, GPEN , C EH (M) , OSCP, (or other vendor agnostic Penetration Testing security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or other vendor agnostic cloud security certification). Security association membership and activities are preferred. This position is Security Sensitive, therefore, candidates will be subject to a criminal background check. The above description is an overview of the job. It is not intended to be an all-inclusive list of duties and responsibilities of the job as duties and responsibilities may change with business needs. Collin College reserves the right to add, change, amend, or delete portions of this job description at any time, with or without notice. Reasonable accommodations may be made by Collin College in its discretion to enable individuals with disabilities to perform the essential functions. NOTE TO APPLICANTS: ALL applicants (internal and external) applying for faculty positions MUST attach a copy of their qualifying transcripts. Faculty applications that do not have the appropriate transcripts attached will be deemed incomplete and will not be considered. Please note, our part-time faculty positions are posted based on anticipated need and student enrollment. This position may remain open during the academic year. If the division has a need for additional part-time faculty for a future assignment and you are selected to continue to the next phase of the hiring process, you will be contacted directly by the Associate Dean to schedule an interview. Required & Preferred Qualifications (if applicable): The intent of this job description is to provide a representative summary of the types of duties and responsibilities that will be required of the positions given this title and shall not be construed as a declaration of the specific duties and responsibilities of any particular position. Employees may be requested to perform job-related tasks other than those specifically presented in this description. Fair Labor Standards Act (exempt/non-exempt) is designated by position. The employer actively supports Americans with Disabilities Act and will consider reasonable accommodations. This is a Security Sensitive position. Therefore candidates will be subject to a criminal background check. Employment Type:Part timeCompensation: Per Adjunct Faculty and CE Instructor Rates For any employment questions, please contact HR at or send an email to: Collin College is an Equal Opportunity Employer and does not discriminate on the basis of any characteristic protected by applicable law.
01/14/2026
Full time
Primary Location:3452 Spur 399, McKinney, Texas, 75069We are searching for candidates that meet the required qualifications and experience and are able to perform the essential duties and responsibilities.Job Summary:Responsible to prepare and deliver coursework in engaging, innovative, and discipline-appropriate ways that reflect a commitment to the college's core values, an understanding of culturally responsive teaching, and knowledge of the teaching field. Meet professional standards for faculty in accordance with college policies and procedures.Required Qualifications: Essential Duties and Responsibilities Teach courses in accordance with the schedule of classes and follow the approved course descriptions and syllabi established by the Division faculty and administered by the associate dean/director. Teaching assignments may be on one or more of the college's campuses or off-site locations and may include evening and weekend programs. Collin College is not hiring for on-line instruction at this time. May include Dual Credit courses. Supplemental Functions Perform other duties as assigned. Perform all duties and maintain all standards in accordance with college policies, procedures and core values. Physical Demands, Working Conditions and Physical Effort Sedentary Work - Exerting up to 10 pounds of force occasionally, a negligible amount of force frequently, and/or constantly having to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met. Positions in this class typically include talking, hearing, seeing, grasping, standing, walking and repetitive motions, plus stooping, kneeling, crouching, and reaching. Relatively free from unpleasant environmental conditions or hazards. Office environment. Little physical effort required. Requirements Master's of Science degree in Cybersecurity from an accredited institution. Academic preparation in the teaching field to include eighteen (18) semester hours in the discipline to be taught. Teaching experience is desired. Licenses and Certifications are desired. Preferred Licenses and Certifications Current industry certifications from security organizations (for example CISSP, GIAC certifications, GPEN , C EH (M) , OSCP, (or other vendor agnostic Penetration Testing security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or other vendor agnostic cloud security certification). Security association membership and activities are preferred. This position is Security Sensitive, therefore, candidates will be subject to a criminal background check. The above description is an overview of the job. It is not intended to be an all-inclusive list of duties and responsibilities of the job as duties and responsibilities may change with business needs. Collin College reserves the right to add, change, amend, or delete portions of this job description at any time, with or without notice. Reasonable accommodations may be made by Collin College in its discretion to enable individuals with disabilities to perform the essential functions. NOTE TO APPLICANTS: ALL applicants (internal and external) applying for faculty positions MUST attach a copy of their qualifying transcripts. Faculty applications that do not have the appropriate transcripts attached will be deemed incomplete and will not be considered. Please note, our part-time faculty positions are posted based on anticipated need and student enrollment. This position may remain open during the academic year. If the division has a need for additional part-time faculty for a future assignment and you are selected to continue to the next phase of the hiring process, you will be contacted directly by the Associate Dean to schedule an interview. Required & Preferred Qualifications (if applicable): The intent of this job description is to provide a representative summary of the types of duties and responsibilities that will be required of the positions given this title and shall not be construed as a declaration of the specific duties and responsibilities of any particular position. Employees may be requested to perform job-related tasks other than those specifically presented in this description. Fair Labor Standards Act (exempt/non-exempt) is designated by position. The employer actively supports Americans with Disabilities Act and will consider reasonable accommodations. This is a Security Sensitive position. Therefore candidates will be subject to a criminal background check. Employment Type:Part timeCompensation: Per Adjunct Faculty and CE Instructor Rates For any employment questions, please contact HR at or send an email to: Collin College is an Equal Opportunity Employer and does not discriminate on the basis of any characteristic protected by applicable law.
Primary Location:3452 Spur 399, McKinney, Texas, 75069We are searching for candidates that meet the required qualifications and experience and are able to perform the essential duties and responsibilities.Job Summary:Responsible to prepare and deliver coursework in engaging, innovative, and discipline-appropriate ways that reflect a commitment to the college's core values, an understanding of culturally responsive teaching, and knowledge of the teaching field. Meet professional standards for faculty in accordance with college policies and procedures.Required Qualifications: Essential Duties and Responsibilities Teach courses in accordance with the schedule of classes and follow the approved course descriptions and syllabi established by the Division faculty and administered by the associate dean/director. Teaching assignments may be on one or more of the college's campuses or off-site locations and may include evening and weekend programs. Collin College is not hiring for on-line instruction at this time. May include Dual Credit courses. Supplemental Functions Perform other duties as assigned. Perform all duties and maintain all standards in accordance with college policies, procedures and core values. Physical Demands, Working Conditions and Physical Effort Sedentary Work - Exerting up to 10 pounds of force occasionally, a negligible amount of force frequently, and/or constantly having to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met. Positions in this class typically include talking, hearing, seeing, grasping, standing, walking and repetitive motions, plus stooping, kneeling, crouching, and reaching. Relatively free from unpleasant environmental conditions or hazards. Office environment. Little physical effort required. Requirements Associate degree or higher in any field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. Certified Information Systems Security Professional (CISSP) l. GIAC information Security Fundamentals (GISF) m. GIAC Security Essentials (GSEC) OR Bachelor's degree or higher in the discipline/qualifying field OR Masters degree or higher in the discipline qualifying fields or a masters degree in any discipline with 18 graduate hours in discipline qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic Penetration Testing security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or other vendor agnostic cloud security certification). Two (2) to five (5) years of workforce experience. Security association membership and activities are preferred. This position is Security Sensitive, therefore, candidates will be subject to a criminal background check. The above description is an overview of the job. It is not intended to be an all-inclusive list of duties and responsibilities of the job as duties and responsibilities may change with business needs. Collin College reserves the right to add, change, amend, or delete portions of this job description at any time, with or without notice. Reasonable accommodations may be made by Collin College in its discretion to enable individuals with disabilities to perform the essential functions. NOTE TO APPLICANTS: ALL applicants (internal and external) applying for faculty positions MUST attach a copy of their qualifying transcripts. Faculty applications that do not have the appropriate transcripts attached will be deemed incomplete and will not be considered. Please note, our part-time faculty positions are posted based on anticipated need and student enrollment. This position may remain open during the academic year. If the division has a need for additional part-time faculty for a future assignment and you are selected to continue to the next phase of the hiring process, you will be contacted directly by the Associate Dean to schedule an interview. Required & Preferred Qualifications (if applicable): The intent of this job description is to provide a representative summary of the types of duties and responsibilities that will be required of the positions given this title and shall not be construed as a declaration of the specific duties and responsibilities of any particular position. Employees may be requested to perform job-related tasks other than those specifically presented in this description. Fair Labor Standards Act (exempt/non-exempt) is designated by position. The employer actively supports Americans with Disabilities Act and will consider reasonable accommodations. This is a Security Sensitive position. Therefore candidates will be subject to a criminal background check. Employment Type:Part timeCompensation: Per Adjunct Faculty and CE Instructor Rates For any employment questions, please contact HR at or send an email to: Collin College is an Equal Opportunity Employer and does not discriminate on the basis of any characteristic protected by applicable law.
01/14/2026
Full time
Primary Location:3452 Spur 399, McKinney, Texas, 75069We are searching for candidates that meet the required qualifications and experience and are able to perform the essential duties and responsibilities.Job Summary:Responsible to prepare and deliver coursework in engaging, innovative, and discipline-appropriate ways that reflect a commitment to the college's core values, an understanding of culturally responsive teaching, and knowledge of the teaching field. Meet professional standards for faculty in accordance with college policies and procedures.Required Qualifications: Essential Duties and Responsibilities Teach courses in accordance with the schedule of classes and follow the approved course descriptions and syllabi established by the Division faculty and administered by the associate dean/director. Teaching assignments may be on one or more of the college's campuses or off-site locations and may include evening and weekend programs. Collin College is not hiring for on-line instruction at this time. May include Dual Credit courses. Supplemental Functions Perform other duties as assigned. Perform all duties and maintain all standards in accordance with college policies, procedures and core values. Physical Demands, Working Conditions and Physical Effort Sedentary Work - Exerting up to 10 pounds of force occasionally, a negligible amount of force frequently, and/or constantly having to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met. Positions in this class typically include talking, hearing, seeing, grasping, standing, walking and repetitive motions, plus stooping, kneeling, crouching, and reaching. Relatively free from unpleasant environmental conditions or hazards. Office environment. Little physical effort required. Requirements Associate degree or higher in any field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. Certified Information Systems Security Professional (CISSP) l. GIAC information Security Fundamentals (GISF) m. GIAC Security Essentials (GSEC) OR Bachelor's degree or higher in the discipline/qualifying field OR Masters degree or higher in the discipline qualifying fields or a masters degree in any discipline with 18 graduate hours in discipline qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic Penetration Testing security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or other vendor agnostic cloud security certification). Two (2) to five (5) years of workforce experience. Security association membership and activities are preferred. This position is Security Sensitive, therefore, candidates will be subject to a criminal background check. The above description is an overview of the job. It is not intended to be an all-inclusive list of duties and responsibilities of the job as duties and responsibilities may change with business needs. Collin College reserves the right to add, change, amend, or delete portions of this job description at any time, with or without notice. Reasonable accommodations may be made by Collin College in its discretion to enable individuals with disabilities to perform the essential functions. NOTE TO APPLICANTS: ALL applicants (internal and external) applying for faculty positions MUST attach a copy of their qualifying transcripts. Faculty applications that do not have the appropriate transcripts attached will be deemed incomplete and will not be considered. Please note, our part-time faculty positions are posted based on anticipated need and student enrollment. This position may remain open during the academic year. If the division has a need for additional part-time faculty for a future assignment and you are selected to continue to the next phase of the hiring process, you will be contacted directly by the Associate Dean to schedule an interview. Required & Preferred Qualifications (if applicable): The intent of this job description is to provide a representative summary of the types of duties and responsibilities that will be required of the positions given this title and shall not be construed as a declaration of the specific duties and responsibilities of any particular position. Employees may be requested to perform job-related tasks other than those specifically presented in this description. Fair Labor Standards Act (exempt/non-exempt) is designated by position. The employer actively supports Americans with Disabilities Act and will consider reasonable accommodations. This is a Security Sensitive position. Therefore candidates will be subject to a criminal background check. Employment Type:Part timeCompensation: Per Adjunct Faculty and CE Instructor Rates For any employment questions, please contact HR at or send an email to: Collin College is an Equal Opportunity Employer and does not discriminate on the basis of any characteristic protected by applicable law.
Cloud and Systems Administrator SUNY Empire is seeking a highly motivated and detail-oriented Cloud and Systems Administrator to join our Information Technology team. The Systems Administrator will be responsible for managing the university's hybrid cloud infrastructure, encompassing both on-premises and externally hosted solutions. The successful candidate will demonstrate a strong commitment to providing exceptional customer service while developing and implementing effective technical solutions that support the university's mission. This role is ideal for a solutions-driven professional who can balance technical expertise with a strong focus on customer service. The Systems Administrator will work closely with the Network Operations team, ITS colleagues, and third-party vendors to design, maintain, and improve enterprise systems. Key responsibilities include the daily operations and maintenance of enterprise servers in both Windows and Linux environments. The incumbent will also partner with team members and third-party vendors to resolve issues, implement solutions, and ensure thorough documentation. Duties and Responsibilities: VMware Administration Manage VMware environment upgrades, host and cluster maintenance, security patching, template builds, and new VM deployment. Maintain Druva Enterprise cloud backup policies, agents, and error resolution. Windows & Active Directory Administration Manage user and group accounts, Group Policy Objects (GPOs), and AD Connect/DS integration. Support Azure (Entra) AD and hybrid configurations. Systems & Server Maintenance Perform daily operations of enterprise servers in Windows and Linux environments. Maintain and update third-party appliances (remote admin tools, identity management, middleware, etc.). Oversee print server environments and cloud print solutions. Support Microsoft SQL Server installation and patching. Manage datacenter hardware installation, configuration, and decommissioning. Email & Messaging Systems Administer Microsoft Exchange Online, including DNS/MX records and internal mail proxy. Automation & Scripting Develop shell scripts and scheduled tasks (cron) for automation and process improvements. Collaboration & Support Partner with the Cybersecurity team to ensure compliance with SUNY Empire policies. Provide Tier 2 support for Technical Support Specialists and Service Desk teams. Contribute to knowledge base and Tier 2 self-help documentation. Job Requirements: Required Qualifications: Associate degree from a regionally accredited college or university and a minimum of 2 years' applicable programming experience; OR a minimum of 5 years' applicable programming experience. Proficiency with VMware, Windows, and Linux environments. Strong troubleshooting skills across: VMware VMs, Microsoft AD DS, Azure (Entra) AD, DNS, DHCP, IIS, IP networking, Windows Server, and cloud printers. Excellent problem-solving skills and commitment to continuous learning. Strong interpersonal, verbal, and written communication skills. Ability to thrive in a team environment while working independently as needed. Demonstrated customer service orientation and empathy. Preferred Qualifications: Experience with VMware vCenter, Citrix XenApp, and enterprise datacenter hardware. Certifications in Microsoft Azure, M365, or related technologies. Advanced troubleshooting and system-level diagnostic skills. Experience with Dell servers or equivalent platforms. Familiarity with remote support tools (BeyondTrust, RDP, Configuration Manager, etc.). Knowledge of enterprise backup solutions. Scripting or programming experience. Experience with Team Dynamix ticketing system. Familiarity with ITIL/ITSM frameworks. Prior experience in a higher education environment. Special Information: Occasional evening and weekend work may be required. Periodic travel may be required to fulfill department and university-wide commitments. Applicants must be currently authorized to work in the United States on a full-time basis. VISA sponsorship is not available for this position. SUNY Empire provides employees with flexible work options to meet the needs of students, faculty, and staff in a dispersed work environment. Additional Information: Rank/Salary: Programmer-Analyst, SL2 / $60,000-$65,000, dependent upon experience and qualifications. We are pleased to offer our employees an excellent benefit package which includes NYS health insurance, free dental and vision, competitive retirement options, and generous vacation, sick and holiday accruals; and a strong emphasis on work-life balance. We also offer professional-development activities for professionals and support staff. SUNY Empire is an AA/EEO/ADA employer. The University actively seeks applications from women, veterans, individuals with a disability, members of underrepresented groups or anyone that would enrich the diversity of the University. SUNY Empire is committed to fostering a diverse community of outstanding faculty, staff, and students, as well as ensuring equal educational opportunity, employment, and access to services, programs, and activities, without regard to an individual's race, color, national origin, religion, creed, age, disability, sex, gender identity, sexual orientation, familial status, pregnancy, predisposing genetic characteristics, military status, domestic violence victim status, or criminal conviction. Employees, students, applicants, or other members of the university community (including but not limited to vendors, visitors, and guests) may not be subjected to harassment that is prohibited by law or treated adversely or retaliated against based upon a protected characteristic. SUNY Empire provides reasonable accommodations for applicants with disabilities, veterans, or wounded warriors where appropriate. If you would like to request a reasonable accommodation for any part of the application and hiring process, please contact the Office of Human Resources at . In accordance with the Title II Crime Awareness and Security Act, a copy of our crime statistics is available upon request by calling . It can also be viewed online at our Safety and Security website . To apply, visit Copyright 2025 Inc. All rights reserved. Posted by the FREE value-added recruitment advertising agency jeid-8fa6928c28974d4ebb876f5d6aeb6259
01/14/2026
Full time
Cloud and Systems Administrator SUNY Empire is seeking a highly motivated and detail-oriented Cloud and Systems Administrator to join our Information Technology team. The Systems Administrator will be responsible for managing the university's hybrid cloud infrastructure, encompassing both on-premises and externally hosted solutions. The successful candidate will demonstrate a strong commitment to providing exceptional customer service while developing and implementing effective technical solutions that support the university's mission. This role is ideal for a solutions-driven professional who can balance technical expertise with a strong focus on customer service. The Systems Administrator will work closely with the Network Operations team, ITS colleagues, and third-party vendors to design, maintain, and improve enterprise systems. Key responsibilities include the daily operations and maintenance of enterprise servers in both Windows and Linux environments. The incumbent will also partner with team members and third-party vendors to resolve issues, implement solutions, and ensure thorough documentation. Duties and Responsibilities: VMware Administration Manage VMware environment upgrades, host and cluster maintenance, security patching, template builds, and new VM deployment. Maintain Druva Enterprise cloud backup policies, agents, and error resolution. Windows & Active Directory Administration Manage user and group accounts, Group Policy Objects (GPOs), and AD Connect/DS integration. Support Azure (Entra) AD and hybrid configurations. Systems & Server Maintenance Perform daily operations of enterprise servers in Windows and Linux environments. Maintain and update third-party appliances (remote admin tools, identity management, middleware, etc.). Oversee print server environments and cloud print solutions. Support Microsoft SQL Server installation and patching. Manage datacenter hardware installation, configuration, and decommissioning. Email & Messaging Systems Administer Microsoft Exchange Online, including DNS/MX records and internal mail proxy. Automation & Scripting Develop shell scripts and scheduled tasks (cron) for automation and process improvements. Collaboration & Support Partner with the Cybersecurity team to ensure compliance with SUNY Empire policies. Provide Tier 2 support for Technical Support Specialists and Service Desk teams. Contribute to knowledge base and Tier 2 self-help documentation. Job Requirements: Required Qualifications: Associate degree from a regionally accredited college or university and a minimum of 2 years' applicable programming experience; OR a minimum of 5 years' applicable programming experience. Proficiency with VMware, Windows, and Linux environments. Strong troubleshooting skills across: VMware VMs, Microsoft AD DS, Azure (Entra) AD, DNS, DHCP, IIS, IP networking, Windows Server, and cloud printers. Excellent problem-solving skills and commitment to continuous learning. Strong interpersonal, verbal, and written communication skills. Ability to thrive in a team environment while working independently as needed. Demonstrated customer service orientation and empathy. Preferred Qualifications: Experience with VMware vCenter, Citrix XenApp, and enterprise datacenter hardware. Certifications in Microsoft Azure, M365, or related technologies. Advanced troubleshooting and system-level diagnostic skills. Experience with Dell servers or equivalent platforms. Familiarity with remote support tools (BeyondTrust, RDP, Configuration Manager, etc.). Knowledge of enterprise backup solutions. Scripting or programming experience. Experience with Team Dynamix ticketing system. Familiarity with ITIL/ITSM frameworks. Prior experience in a higher education environment. Special Information: Occasional evening and weekend work may be required. Periodic travel may be required to fulfill department and university-wide commitments. Applicants must be currently authorized to work in the United States on a full-time basis. VISA sponsorship is not available for this position. SUNY Empire provides employees with flexible work options to meet the needs of students, faculty, and staff in a dispersed work environment. Additional Information: Rank/Salary: Programmer-Analyst, SL2 / $60,000-$65,000, dependent upon experience and qualifications. We are pleased to offer our employees an excellent benefit package which includes NYS health insurance, free dental and vision, competitive retirement options, and generous vacation, sick and holiday accruals; and a strong emphasis on work-life balance. We also offer professional-development activities for professionals and support staff. SUNY Empire is an AA/EEO/ADA employer. The University actively seeks applications from women, veterans, individuals with a disability, members of underrepresented groups or anyone that would enrich the diversity of the University. SUNY Empire is committed to fostering a diverse community of outstanding faculty, staff, and students, as well as ensuring equal educational opportunity, employment, and access to services, programs, and activities, without regard to an individual's race, color, national origin, religion, creed, age, disability, sex, gender identity, sexual orientation, familial status, pregnancy, predisposing genetic characteristics, military status, domestic violence victim status, or criminal conviction. Employees, students, applicants, or other members of the university community (including but not limited to vendors, visitors, and guests) may not be subjected to harassment that is prohibited by law or treated adversely or retaliated against based upon a protected characteristic. SUNY Empire provides reasonable accommodations for applicants with disabilities, veterans, or wounded warriors where appropriate. If you would like to request a reasonable accommodation for any part of the application and hiring process, please contact the Office of Human Resources at . In accordance with the Title II Crime Awareness and Security Act, a copy of our crime statistics is available upon request by calling . It can also be viewed online at our Safety and Security website . To apply, visit Copyright 2025 Inc. All rights reserved. Posted by the FREE value-added recruitment advertising agency jeid-8fa6928c28974d4ebb876f5d6aeb6259
IT Systems Support Analyst Job ID: 292982 Location: Augusta University Full/Part Time: Full Time Regular/Temporary: About Us Augusta University is Georgia's innovation center for education and health care, training the next generation of innovators, leaders, and healthcare providers in classrooms and clinics on four campuses in Augusta and locations across the state. More than 12,000 students choose Augusta for educational opportunities at the center of Georgia's cybersecurity hub and experiential learning that blends arts and application, humanities, and the health sciences. Augusta is home to Georgia's only public academic health center, where groundbreaking research is creating a healthier, more prosperous Georgia, and world-class clinicians are bringing the medicine of tomorrow to patient care today. Our mission and values make Augusta University an institution like no other. Augusta University's distinct characteristics in education and research include real-world experiences and community engagement, as well as a culture of building community, corporate and government partnerships that address health, security, economic and societal concerns locally and across the state. The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Location Augusta University- Our Health Sciences Campus: th Street, Augusta, GA 30912 Our Summerville Campus: 2500 Walton Way, Augusta, GA 30904 College/Department Information The Division of Information Technology's mission at Augusta University is to anticipate and respond effectively to a changing world with agile, innovative, robust and secure services that educate and inspire students, empower clinicians, educators, researchers and administrators, advance learning, discovery and care. Job Summary As a member of Augusta University's (AU) Information Technology (IT) division, the staff members will adhere to the highest standards of customer service and professionalism in the implementation of all duties and responsibilities. The IT Systems Support Professional is a critical source of dedicated technology support for students, faculty, and staff across all campuses of the Medical College of Georgia and is designated as essential personnel for AU-IT operations. With duties ranging from audiovisual support, personal computing hardware/software support, lecture capture, network connectivity diagnostics, simulation device support, telehealth device support, and productivity software diagnostics, this position is a fundamental necessity for optimal operations. Under limited leadership, the incumbent will provide clear, concise, and diplomatic communications with effective strategies to resolve issues, or escalate for resolution, as appropriate. The position will require day and overnight travel throughout the State of Georgia. Responsibilities TECHNICAL SUPPORT: Provides primary IT support for technical issues at regional/clinical campuses of the Medical College of Georgia. Delivers remote or on-site diagnostic/repair support for a variety of technologies employed in administrative, academic, and simulation operations. Functions as liaison for ancillary IT groups for incident engagement and escalation to ensure timely resolution of reported incidents. ALTERNATE SUPPORT: Provides alternate IT support for the Medical College of Georgia's primary campus in Augusta, providing on-site diagnostic/repair support for a variety of technologies utilized in administrative operations. Functions as liaison for ancillary AU and AU-IT groups for incident engagement and escalation to ensure timely resolution of reported incidents. SERVICE MANAGEMENT APPLICATION: Completes and oversees the timely submission of reported problems through AU's Information Technology Service Management (ITSM) application. Fully documents support efforts, ensuring appropriate Service Level Agreements (SLA) are met and services restored as efficiently as possible. Proactively monitors reported or resolved incidents for tracking of trends and engages others as necessary for preventive or corrective actions. SYSTEM SUPPORT: Proactively tests, maintains, and facilitates the usage of small group collaborative video-conferencing systems, web-conferencing systems, and related technology to support academic teaching, administrative meetings, and special events within departmental spaces. ADVISE/CONSULT CUSTOMERS: Consults and advises customers on best practices for IT engagement, adherence to security policies, data storage, asset management tracking, evaluation of hardware/software upgrades/refresh, and productivity software collaboration to optimize departmental practices and procedures. REGIONAL SUPPORT: For assigned regional/clinical campuses, champions site-specific coordinated support efforts between regional/clinical campus, AU-IT groups, USG networking, host IT group, or contracted vendors. Maintains accurate records of all relevant support contacts and contracts for each regional/clinical campus, including the appropriate steps to take for after-hours support needs. TECHNOLOGY SOLUTIONS: Participates in the evaluation, recommendation, development, and implementation of reliable, efficient, and cost-effective technology solutions through partnerships with vendors and select AU-IT groups. : Perform other duties as assigned. Required Qualifications Bachelor's degree from an accredited college or university and two years of related field experience OR Associate's degree from an accredited college or university and three years of directly related field experience OR High School diploma, GED or equivalent from a recognized State or Federal accrediting organization and seven years of directly related experience and a minimum of two related certifications, i.e. CompTIA A+, or CTS. Must possess and maintain a valid state driver's license. Preferred Qualifications Technical certifications or experience working with: Comp TIA A+ certification, AVIXA CTS certification, Microsoft Office Specialist certification, Project Management certification (any level). Master's degree from an accredited college or university in Instructional/Educational Technology, Information Technology, or related field. Experience in a higher education environment. Teaching and/or training experience. Knowledge, Skills, & Abilities KNOWLEDGE Advanced knowledge of Windows and Apple hardware/software/OS/iOS support practices. Advanced knowledge of productivity software such Microsoft Office, Adobe Creative Cloud, as well as cloud-based storage such as Box and OneDrive installation and operation. Knowledge of network connectivity, topography, and use of wireless networking, videoconferencing, Zoom/Teams web conferencing, and live streaming. Knowledgeable in the configuration and operation of presentation systems, computer-based simulation, lecture capture, and related collaborative solutions found in classrooms, conference rooms, and event settings. SKILLS Excellent interpersonal, written, and verbal communication skills. Detail-oriented with strong prioritization and organizational skills. Skilled and experienced in providing exceptional customer service. ABILITIES Ability to communicate orally and in writing in a clear and concise manner to a variety of customer knowledge levels. Ability to establish and maintain effective working relationships with co-workers, the AU community, and visitors to AU. Ability to troubleshoot and resolve audiovisual system issues in a compressed timeframe. Ability to prioritize and execute tasks in a high-pressure environment. Ability to work before or after hours/weekends as required. Ability to read and understand technical documentation and conduct research to identify and implement corrective solutions. Ability to maintain confidentiality. Ability to pay close attention to details. Shift/Salary/Benefits Shift: Days; M-F (Work outside of the standard business hours may be required) Pay Band: B10 Salary: $52,500/annually-$53,341/annually Salary to be commensurate with qualifications of the selected candidate within the established range (generally minimum-midpoint) of the position Recruitment Period: Until Filled Augusta University offers a variety of benefits to full-time benefits-eligible employees and some of our half-time (or more) employees. Benefits that may be elected could include health insurance, dental insurance, life insurance, Teachers Retirement System (or Optional Retirement Plan), as well as earned vacation time, sick leave, and 13 paid holidays. Also . click apply for full job details
01/14/2026
Full time
IT Systems Support Analyst Job ID: 292982 Location: Augusta University Full/Part Time: Full Time Regular/Temporary: About Us Augusta University is Georgia's innovation center for education and health care, training the next generation of innovators, leaders, and healthcare providers in classrooms and clinics on four campuses in Augusta and locations across the state. More than 12,000 students choose Augusta for educational opportunities at the center of Georgia's cybersecurity hub and experiential learning that blends arts and application, humanities, and the health sciences. Augusta is home to Georgia's only public academic health center, where groundbreaking research is creating a healthier, more prosperous Georgia, and world-class clinicians are bringing the medicine of tomorrow to patient care today. Our mission and values make Augusta University an institution like no other. Augusta University's distinct characteristics in education and research include real-world experiences and community engagement, as well as a culture of building community, corporate and government partnerships that address health, security, economic and societal concerns locally and across the state. The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found online at Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found online at . Location Augusta University- Our Health Sciences Campus: th Street, Augusta, GA 30912 Our Summerville Campus: 2500 Walton Way, Augusta, GA 30904 College/Department Information The Division of Information Technology's mission at Augusta University is to anticipate and respond effectively to a changing world with agile, innovative, robust and secure services that educate and inspire students, empower clinicians, educators, researchers and administrators, advance learning, discovery and care. Job Summary As a member of Augusta University's (AU) Information Technology (IT) division, the staff members will adhere to the highest standards of customer service and professionalism in the implementation of all duties and responsibilities. The IT Systems Support Professional is a critical source of dedicated technology support for students, faculty, and staff across all campuses of the Medical College of Georgia and is designated as essential personnel for AU-IT operations. With duties ranging from audiovisual support, personal computing hardware/software support, lecture capture, network connectivity diagnostics, simulation device support, telehealth device support, and productivity software diagnostics, this position is a fundamental necessity for optimal operations. Under limited leadership, the incumbent will provide clear, concise, and diplomatic communications with effective strategies to resolve issues, or escalate for resolution, as appropriate. The position will require day and overnight travel throughout the State of Georgia. Responsibilities TECHNICAL SUPPORT: Provides primary IT support for technical issues at regional/clinical campuses of the Medical College of Georgia. Delivers remote or on-site diagnostic/repair support for a variety of technologies employed in administrative, academic, and simulation operations. Functions as liaison for ancillary IT groups for incident engagement and escalation to ensure timely resolution of reported incidents. ALTERNATE SUPPORT: Provides alternate IT support for the Medical College of Georgia's primary campus in Augusta, providing on-site diagnostic/repair support for a variety of technologies utilized in administrative operations. Functions as liaison for ancillary AU and AU-IT groups for incident engagement and escalation to ensure timely resolution of reported incidents. SERVICE MANAGEMENT APPLICATION: Completes and oversees the timely submission of reported problems through AU's Information Technology Service Management (ITSM) application. Fully documents support efforts, ensuring appropriate Service Level Agreements (SLA) are met and services restored as efficiently as possible. Proactively monitors reported or resolved incidents for tracking of trends and engages others as necessary for preventive or corrective actions. SYSTEM SUPPORT: Proactively tests, maintains, and facilitates the usage of small group collaborative video-conferencing systems, web-conferencing systems, and related technology to support academic teaching, administrative meetings, and special events within departmental spaces. ADVISE/CONSULT CUSTOMERS: Consults and advises customers on best practices for IT engagement, adherence to security policies, data storage, asset management tracking, evaluation of hardware/software upgrades/refresh, and productivity software collaboration to optimize departmental practices and procedures. REGIONAL SUPPORT: For assigned regional/clinical campuses, champions site-specific coordinated support efforts between regional/clinical campus, AU-IT groups, USG networking, host IT group, or contracted vendors. Maintains accurate records of all relevant support contacts and contracts for each regional/clinical campus, including the appropriate steps to take for after-hours support needs. TECHNOLOGY SOLUTIONS: Participates in the evaluation, recommendation, development, and implementation of reliable, efficient, and cost-effective technology solutions through partnerships with vendors and select AU-IT groups. : Perform other duties as assigned. Required Qualifications Bachelor's degree from an accredited college or university and two years of related field experience OR Associate's degree from an accredited college or university and three years of directly related field experience OR High School diploma, GED or equivalent from a recognized State or Federal accrediting organization and seven years of directly related experience and a minimum of two related certifications, i.e. CompTIA A+, or CTS. Must possess and maintain a valid state driver's license. Preferred Qualifications Technical certifications or experience working with: Comp TIA A+ certification, AVIXA CTS certification, Microsoft Office Specialist certification, Project Management certification (any level). Master's degree from an accredited college or university in Instructional/Educational Technology, Information Technology, or related field. Experience in a higher education environment. Teaching and/or training experience. Knowledge, Skills, & Abilities KNOWLEDGE Advanced knowledge of Windows and Apple hardware/software/OS/iOS support practices. Advanced knowledge of productivity software such Microsoft Office, Adobe Creative Cloud, as well as cloud-based storage such as Box and OneDrive installation and operation. Knowledge of network connectivity, topography, and use of wireless networking, videoconferencing, Zoom/Teams web conferencing, and live streaming. Knowledgeable in the configuration and operation of presentation systems, computer-based simulation, lecture capture, and related collaborative solutions found in classrooms, conference rooms, and event settings. SKILLS Excellent interpersonal, written, and verbal communication skills. Detail-oriented with strong prioritization and organizational skills. Skilled and experienced in providing exceptional customer service. ABILITIES Ability to communicate orally and in writing in a clear and concise manner to a variety of customer knowledge levels. Ability to establish and maintain effective working relationships with co-workers, the AU community, and visitors to AU. Ability to troubleshoot and resolve audiovisual system issues in a compressed timeframe. Ability to prioritize and execute tasks in a high-pressure environment. Ability to work before or after hours/weekends as required. Ability to read and understand technical documentation and conduct research to identify and implement corrective solutions. Ability to maintain confidentiality. Ability to pay close attention to details. Shift/Salary/Benefits Shift: Days; M-F (Work outside of the standard business hours may be required) Pay Band: B10 Salary: $52,500/annually-$53,341/annually Salary to be commensurate with qualifications of the selected candidate within the established range (generally minimum-midpoint) of the position Recruitment Period: Until Filled Augusta University offers a variety of benefits to full-time benefits-eligible employees and some of our half-time (or more) employees. Benefits that may be elected could include health insurance, dental insurance, life insurance, Teachers Retirement System (or Optional Retirement Plan), as well as earned vacation time, sick leave, and 13 paid holidays. Also . click apply for full job details
Job ID: 705203BR Date posted: Jan. 06, 2026 Description: What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. As a cyber security professional at Lockheed Martin, you'll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted flow of energy that keeps modern life moving. Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep the threats at bay. Cyber Lockheed Martin Who we are: Are you driven by the excitement of harnessing the latest advancements in artificial intelligence, machine learning, and data analytics to revolutionize the way we approach complex challenges? Do you find satisfaction in developing innovative solutions that leverage the power of technology to stay ahead of the curve? If so, join Lockheed Martin's team, where we're pioneering the modernization of technology and pushing the boundaries of what's possible. Our team is dedicated to pioneering the latest advancements and we're looking for someone who shares our commitment to excellence and innovation. Who You Are: Here, you are going to provide life-cycle services to advance mission in support of Cybersecurity and SIGINT midpoint collection. • You will modernize and sustain capabilities to include providing new features and enhancements to Front End Solutions systems. This will allow for products to work at-scale with processing of target communications across multiple types of Midpoint accesses. • You will propel the customer into the next phase of product suite modernization by leveraging advancements in technologies such as containerization, cloud capabilities, dataflows, and Artificial Intelligence/Machine Learning (AI/ML) capabilities. The Work: We are proactively recruiting for a future need, with the expectation of a 2025 or early 2026 start date. This requisition is being used as a placeholder for your interest in one of these roles to bring a modernization mindset to current technology. As the roles open up over time, we will invite you to review the best matching one(s). We are seeking professionals interested in a variety of responsibilities including; • Software development • Software engineering • Systems engineering • Cyber researchers (Capabilities Analyst, etc) • System Security (ISSO / ISSE / ISSM) • Technical writer • Test Engineers • Network Engineers • User Experience Designer • Data Science • Systems Administrator (Linux) For a complete list that changes weekly, use this term to search via the Lockheed Martin jobs website: Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment. Stop having to look for a new job with every rumor and whim of contract changes. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Plus, you may be eligible for up to a $25K sign on bonus as an external hire! Basic Qualifications: • Current DoD Top Secret SCI with Polygraph Seeking multiple levels of Software Engineers: SWE0: • A High School Diploma or GED plus four (4) years of general software engineering experience OR • Bachelor's degree in Computer Science or related discipline from an accredited college or university. SWE1: • A High School Diploma or GED plus eleven (11) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus seven (7) years of software engineering experience. SWE2: • A High School Diploma or GED plus eighteen (18) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus fourteen (14) years of software engineering experience. SWE3: • A High School Diploma or GED plus twenty-four (24) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus twenty (20) years of software engineering experience. Required Skills and Experience: • Analyze user requirements to derive software design and performance requirements • Debug existing software and correct defects • Provide recommendations for improving documentation and software development process standards • Design and code new software or modify existing software to add new features • Integrate existing software into new or modified systems or operating environments • Develop simple data queries for existing or proposed databases or data repositories • Write or review software and system documentation Desired Skills: • Familiar with RF algorithm development Standard Job Description : Designs, develops, documents, tests, and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Conducts vulnerability research, reverse engineering, penetration testing (red/blue teams), develops and integrates low-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge of subject matter (hardware, software, networks, cloud, etc.) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. USE OF THIS CLASSIFICATION REQUIRES AUTHORIZATION FROM THE BUSINESS AREA CYBER DIRECTOR OR DELEGATE Typical Minimums : Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 14 years or more of professional experience; or 12 years of professional experience with a related Masters degree. Considered an expert, authority in discipline. Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $150,800 - $265,880. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They're dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about. As a leading technology innovation company . click apply for full job details
01/14/2026
Full time
Job ID: 705203BR Date posted: Jan. 06, 2026 Description: What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. As a cyber security professional at Lockheed Martin, you'll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted flow of energy that keeps modern life moving. Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep the threats at bay. Cyber Lockheed Martin Who we are: Are you driven by the excitement of harnessing the latest advancements in artificial intelligence, machine learning, and data analytics to revolutionize the way we approach complex challenges? Do you find satisfaction in developing innovative solutions that leverage the power of technology to stay ahead of the curve? If so, join Lockheed Martin's team, where we're pioneering the modernization of technology and pushing the boundaries of what's possible. Our team is dedicated to pioneering the latest advancements and we're looking for someone who shares our commitment to excellence and innovation. Who You Are: Here, you are going to provide life-cycle services to advance mission in support of Cybersecurity and SIGINT midpoint collection. • You will modernize and sustain capabilities to include providing new features and enhancements to Front End Solutions systems. This will allow for products to work at-scale with processing of target communications across multiple types of Midpoint accesses. • You will propel the customer into the next phase of product suite modernization by leveraging advancements in technologies such as containerization, cloud capabilities, dataflows, and Artificial Intelligence/Machine Learning (AI/ML) capabilities. The Work: We are proactively recruiting for a future need, with the expectation of a 2025 or early 2026 start date. This requisition is being used as a placeholder for your interest in one of these roles to bring a modernization mindset to current technology. As the roles open up over time, we will invite you to review the best matching one(s). We are seeking professionals interested in a variety of responsibilities including; • Software development • Software engineering • Systems engineering • Cyber researchers (Capabilities Analyst, etc) • System Security (ISSO / ISSE / ISSM) • Technical writer • Test Engineers • Network Engineers • User Experience Designer • Data Science • Systems Administrator (Linux) For a complete list that changes weekly, use this term to search via the Lockheed Martin jobs website: Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment. Stop having to look for a new job with every rumor and whim of contract changes. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Plus, you may be eligible for up to a $25K sign on bonus as an external hire! Basic Qualifications: • Current DoD Top Secret SCI with Polygraph Seeking multiple levels of Software Engineers: SWE0: • A High School Diploma or GED plus four (4) years of general software engineering experience OR • Bachelor's degree in Computer Science or related discipline from an accredited college or university. SWE1: • A High School Diploma or GED plus eleven (11) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus seven (7) years of software engineering experience. SWE2: • A High School Diploma or GED plus eighteen (18) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus fourteen (14) years of software engineering experience. SWE3: • A High School Diploma or GED plus twenty-four (24) years of general software engineering experience OR • A Bachelor's degree in Computer Science or related discipline from an accredited college or university, plus twenty (20) years of software engineering experience. Required Skills and Experience: • Analyze user requirements to derive software design and performance requirements • Debug existing software and correct defects • Provide recommendations for improving documentation and software development process standards • Design and code new software or modify existing software to add new features • Integrate existing software into new or modified systems or operating environments • Develop simple data queries for existing or proposed databases or data repositories • Write or review software and system documentation Desired Skills: • Familiar with RF algorithm development Standard Job Description : Designs, develops, documents, tests, and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Conducts vulnerability research, reverse engineering, penetration testing (red/blue teams), develops and integrates low-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge of subject matter (hardware, software, networks, cloud, etc.) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. USE OF THIS CLASSIFICATION REQUIRES AUTHORIZATION FROM THE BUSINESS AREA CYBER DIRECTOR OR DELEGATE Typical Minimums : Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 14 years or more of professional experience; or 12 years of professional experience with a related Masters degree. Considered an expert, authority in discipline. Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $150,800 - $265,880. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They're dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about. As a leading technology innovation company . click apply for full job details
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
01/14/2026
Full time
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
01/14/2026
Full time
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
12/19/2025
Full time
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
12/19/2025
Full time
Job ID: 701893BR Date posted: Nov. 12, 2025 Description: The Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge of computer network protocols and architectures. This requisition is being used as a placeholder for your interest in one of these roles. The salary range associated here is NOT relevant since this is a pipeline req, when you apply, we prescreen for your preferences to find the perfect match. • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers • Offensive cyber tool developers • Embedded developers • Cyber researchers What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber Lockheed Martin Who we are: Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. Know someone? Consider participating in our External Referral Program . Click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer PLUS you may be eligible for up to a $25K sign on bonus for you to join the team. Basic Qualifications: • Current DoD Top Secret SCI with both Polygraphs • Bachelor's in engineering / technical discipline from an accredited college or equivalent experience/combined education or experience in lieu of a degree. • Current experience as an offensive computer network professional • At least 6 years of experience overall Desired Skills: • More than an interest in Offensive Cyber Solutions • Lead software design and development of tools and/or end-to-end data flow • Provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by software development procedures and processes • Provide/author and participate in technical presentations • Minimum 6 years of experience programming in Assembly, C, C++, Java, Perl, or Python • Minimum 5 years of experience developing in Windows applications using Visual Studio or .NET environments and/or UNIX applications using make files or comparable build environment • Minimum 4 years of experience with programming CNO tools and techniques, 2 of which were for the US Government • Minimum 2 years in network sockets programming including developing packet-level programs using expert understanding of IP, TCP, and application-level protocols Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $86,100 - $151,800. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a diligent and team-oriented Cyber Risk Management Analyst to support our Third-Party Risk Management team. In this position, you will aid in overseeing the first line's third-party technology risk management activities, contributing to the organization's cyber resilience. You will assist in the implementation of a risk-based framework to manage cybersecurity risks associated with vendors and partners, ensuring alignment with risk appetite and regulatory requirements. This role provides an excellent opportunity to learn and develop skills in third-party risk management while contributing to the organization's overall cybersecurity posture. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: Charlotte, NC or Tampa, FL. Relocation assistance is not available for this position. What you'll do: Implements and works to ensure the maintenance and continuous improvement of a comprehensive, risk-based Third-Party Risk Management (TPRM) technology framework aligns with industry best practices and regulatory expectations. Conducts independent review and challenge of the first line's identification and assessment of inherent and residual cybersecurity risks associated with third-party relationships. This includes initial and on-going review of inherent risk assessments, security questionnaires, and other technology and security assessments. Conducts independent testing of the design and operational effectiveness of controls implemented by the first line of defense and third parties related to third party systems and technology. Monitor the first line's adherence to the organization's cybersecurity policies, standards, and procedures related to third-party risk. Provide the business feedback and recommendations for improvement. Collects and analyzes key risk indicators (KRIs) and key performance indicators (KPIs) to continuously monitor the cyber risk posture of third parties. Contributes and develops reports to management. Stays abreast of evolving cybersecurity regulations and guidance related to TPRM and assist in ensuring the organization's program is aligned with requirements. Reviews and provides input and feedback to the first line's processes for responding to cybersecurity incidents involving third parties. Reviews vendor due diligence processes, ensuring that potential vendors are thoroughly vetted for cybersecurity risks before being onboarded. Reviews cybersecurity requirements in contracts with third parties, ensuring that appropriate security clauses are included. Maintains accurate and up-to-date documentation of TPRM technology activities. Monitors third-party relationships for Member complaints and levels of Member satisfaction ensuring service level agreements are being met. Identify process improvements to enhance the efficiency and effectiveness of the second line cyber and technology TPRM program. What you have: Bachelor's degree in a related field (e.g., Information Technology, Cybersecurity, Business Administration). 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. 4 years of vendor/third-party risk management experience, in financial services, information technology, cyber security or related industry. 2 years of experience with relevant regulatory compliance, industry regulations and regulatory data sources such as Office of the Comptroller of the Currency (OCC), Federal Reserve Board, Consumer Financial Protection Bureau (CFPB), etc. Proficient knowledge of relevant cyber and/or technology process(es) and regulatory compliance requirements. Strong knowledge of cybersecurity principles and technologies. Experience working within a regulated, policy-driven environment. Experience with the full lifecycle of third-party relationships, including detailed tasks like invoice reconciliation and ensuring proper termination procedures. Knowledge of cybersecurity principles, technologies, and frameworks (e.g., NIST CSF, ISO 27001). Knowledge of third-party risk management methodologies and best practices (e.g., Shared Assessments). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. What sets you apart: Demonstrated experience with technology risk dimensions, including information security principles, and relevant laws, rules, and regulations. Demonstrated knowledge of cybersecurity principles (NIST 800.53), technologies, and frameworks, specifically NIST Cybersecurity Framework and ISO 27001. Relevant certifications such as CISSP (ISC2), CISA, CRISC, or other certifications from ISACA. Experience in auditing, particularly in the context of third-party risk management, including evaluating or conducting due diligence assessments. Possesses experience using Governance, Risk, and Compliance (GRC) tools and Third-Party Risk Management (TPRM) programs. Compensation range: The salary range for this position is: $85,040.00 - $162,550.00. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
12/17/2025
Full time
Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a diligent and team-oriented Cyber Risk Management Analyst to support our Third-Party Risk Management team. In this position, you will aid in overseeing the first line's third-party technology risk management activities, contributing to the organization's cyber resilience. You will assist in the implementation of a risk-based framework to manage cybersecurity risks associated with vendors and partners, ensuring alignment with risk appetite and regulatory requirements. This role provides an excellent opportunity to learn and develop skills in third-party risk management while contributing to the organization's overall cybersecurity posture. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: Charlotte, NC or Tampa, FL. Relocation assistance is not available for this position. What you'll do: Implements and works to ensure the maintenance and continuous improvement of a comprehensive, risk-based Third-Party Risk Management (TPRM) technology framework aligns with industry best practices and regulatory expectations. Conducts independent review and challenge of the first line's identification and assessment of inherent and residual cybersecurity risks associated with third-party relationships. This includes initial and on-going review of inherent risk assessments, security questionnaires, and other technology and security assessments. Conducts independent testing of the design and operational effectiveness of controls implemented by the first line of defense and third parties related to third party systems and technology. Monitor the first line's adherence to the organization's cybersecurity policies, standards, and procedures related to third-party risk. Provide the business feedback and recommendations for improvement. Collects and analyzes key risk indicators (KRIs) and key performance indicators (KPIs) to continuously monitor the cyber risk posture of third parties. Contributes and develops reports to management. Stays abreast of evolving cybersecurity regulations and guidance related to TPRM and assist in ensuring the organization's program is aligned with requirements. Reviews and provides input and feedback to the first line's processes for responding to cybersecurity incidents involving third parties. Reviews vendor due diligence processes, ensuring that potential vendors are thoroughly vetted for cybersecurity risks before being onboarded. Reviews cybersecurity requirements in contracts with third parties, ensuring that appropriate security clauses are included. Maintains accurate and up-to-date documentation of TPRM technology activities. Monitors third-party relationships for Member complaints and levels of Member satisfaction ensuring service level agreements are being met. Identify process improvements to enhance the efficiency and effectiveness of the second line cyber and technology TPRM program. What you have: Bachelor's degree in a related field (e.g., Information Technology, Cybersecurity, Business Administration). 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. 4 years of vendor/third-party risk management experience, in financial services, information technology, cyber security or related industry. 2 years of experience with relevant regulatory compliance, industry regulations and regulatory data sources such as Office of the Comptroller of the Currency (OCC), Federal Reserve Board, Consumer Financial Protection Bureau (CFPB), etc. Proficient knowledge of relevant cyber and/or technology process(es) and regulatory compliance requirements. Strong knowledge of cybersecurity principles and technologies. Experience working within a regulated, policy-driven environment. Experience with the full lifecycle of third-party relationships, including detailed tasks like invoice reconciliation and ensuring proper termination procedures. Knowledge of cybersecurity principles, technologies, and frameworks (e.g., NIST CSF, ISO 27001). Knowledge of third-party risk management methodologies and best practices (e.g., Shared Assessments). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. What sets you apart: Demonstrated experience with technology risk dimensions, including information security principles, and relevant laws, rules, and regulations. Demonstrated knowledge of cybersecurity principles (NIST 800.53), technologies, and frameworks, specifically NIST Cybersecurity Framework and ISO 27001. Relevant certifications such as CISSP (ISC2), CISA, CRISC, or other certifications from ISACA. Experience in auditing, particularly in the context of third-party risk management, including evaluating or conducting due diligence assessments. Possesses experience using Governance, Risk, and Compliance (GRC) tools and Third-Party Risk Management (TPRM) programs. Compensation range: The salary range for this position is: $85,040.00 - $162,550.00. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a diligent and team-oriented Cyber Risk Management Analyst to support our Third-Party Risk Management team. In this position, you will aid in overseeing the first line's third-party technology risk management activities, contributing to the organization's cyber resilience. You will assist in the implementation of a risk-based framework to manage cybersecurity risks associated with vendors and partners, ensuring alignment with risk appetite and regulatory requirements. This role provides an excellent opportunity to learn and develop skills in third-party risk management while contributing to the organization's overall cybersecurity posture. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: Charlotte, NC or Tampa, FL. Relocation assistance is not available for this position. What you'll do: Implements and works to ensure the maintenance and continuous improvement of a comprehensive, risk-based Third-Party Risk Management (TPRM) technology framework aligns with industry best practices and regulatory expectations. Conducts independent review and challenge of the first line's identification and assessment of inherent and residual cybersecurity risks associated with third-party relationships. This includes initial and on-going review of inherent risk assessments, security questionnaires, and other technology and security assessments. Conducts independent testing of the design and operational effectiveness of controls implemented by the first line of defense and third parties related to third party systems and technology. Monitor the first line's adherence to the organization's cybersecurity policies, standards, and procedures related to third-party risk. Provide the business feedback and recommendations for improvement. Collects and analyzes key risk indicators (KRIs) and key performance indicators (KPIs) to continuously monitor the cyber risk posture of third parties. Contributes and develops reports to management. Stays abreast of evolving cybersecurity regulations and guidance related to TPRM and assist in ensuring the organization's program is aligned with requirements. Reviews and provides input and feedback to the first line's processes for responding to cybersecurity incidents involving third parties. Reviews vendor due diligence processes, ensuring that potential vendors are thoroughly vetted for cybersecurity risks before being onboarded. Reviews cybersecurity requirements in contracts with third parties, ensuring that appropriate security clauses are included. Maintains accurate and up-to-date documentation of TPRM technology activities. Monitors third-party relationships for Member complaints and levels of Member satisfaction ensuring service level agreements are being met. Identify process improvements to enhance the efficiency and effectiveness of the second line cyber and technology TPRM program. What you have: Bachelor's degree in a related field (e.g., Information Technology, Cybersecurity, Business Administration). 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. 4 years of vendor/third-party risk management experience, in financial services, information technology, cyber security or related industry. 2 years of experience with relevant regulatory compliance, industry regulations and regulatory data sources such as Office of the Comptroller of the Currency (OCC), Federal Reserve Board, Consumer Financial Protection Bureau (CFPB), etc. Proficient knowledge of relevant cyber and/or technology process(es) and regulatory compliance requirements. Strong knowledge of cybersecurity principles and technologies. Experience working within a regulated, policy-driven environment. Experience with the full lifecycle of third-party relationships, including detailed tasks like invoice reconciliation and ensuring proper termination procedures. Knowledge of cybersecurity principles, technologies, and frameworks (e.g., NIST CSF, ISO 27001). Knowledge of third-party risk management methodologies and best practices (e.g., Shared Assessments). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. What sets you apart: Demonstrated experience with technology risk dimensions, including information security principles, and relevant laws, rules, and regulations. Demonstrated knowledge of cybersecurity principles (NIST 800.53), technologies, and frameworks, specifically NIST Cybersecurity Framework and ISO 27001. Relevant certifications such as CISSP (ISC2), CISA, CRISC, or other certifications from ISACA. Experience in auditing, particularly in the context of third-party risk management, including evaluating or conducting due diligence assessments. Possesses experience using Governance, Risk, and Compliance (GRC) tools and Third-Party Risk Management (TPRM) programs. Compensation range: The salary range for this position is: $85,040.00 - $162,550.00. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
12/17/2025
Full time
Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a diligent and team-oriented Cyber Risk Management Analyst to support our Third-Party Risk Management team. In this position, you will aid in overseeing the first line's third-party technology risk management activities, contributing to the organization's cyber resilience. You will assist in the implementation of a risk-based framework to manage cybersecurity risks associated with vendors and partners, ensuring alignment with risk appetite and regulatory requirements. This role provides an excellent opportunity to learn and develop skills in third-party risk management while contributing to the organization's overall cybersecurity posture. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: Charlotte, NC or Tampa, FL. Relocation assistance is not available for this position. What you'll do: Implements and works to ensure the maintenance and continuous improvement of a comprehensive, risk-based Third-Party Risk Management (TPRM) technology framework aligns with industry best practices and regulatory expectations. Conducts independent review and challenge of the first line's identification and assessment of inherent and residual cybersecurity risks associated with third-party relationships. This includes initial and on-going review of inherent risk assessments, security questionnaires, and other technology and security assessments. Conducts independent testing of the design and operational effectiveness of controls implemented by the first line of defense and third parties related to third party systems and technology. Monitor the first line's adherence to the organization's cybersecurity policies, standards, and procedures related to third-party risk. Provide the business feedback and recommendations for improvement. Collects and analyzes key risk indicators (KRIs) and key performance indicators (KPIs) to continuously monitor the cyber risk posture of third parties. Contributes and develops reports to management. Stays abreast of evolving cybersecurity regulations and guidance related to TPRM and assist in ensuring the organization's program is aligned with requirements. Reviews and provides input and feedback to the first line's processes for responding to cybersecurity incidents involving third parties. Reviews vendor due diligence processes, ensuring that potential vendors are thoroughly vetted for cybersecurity risks before being onboarded. Reviews cybersecurity requirements in contracts with third parties, ensuring that appropriate security clauses are included. Maintains accurate and up-to-date documentation of TPRM technology activities. Monitors third-party relationships for Member complaints and levels of Member satisfaction ensuring service level agreements are being met. Identify process improvements to enhance the efficiency and effectiveness of the second line cyber and technology TPRM program. What you have: Bachelor's degree in a related field (e.g., Information Technology, Cybersecurity, Business Administration). 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. 4 years of vendor/third-party risk management experience, in financial services, information technology, cyber security or related industry. 2 years of experience with relevant regulatory compliance, industry regulations and regulatory data sources such as Office of the Comptroller of the Currency (OCC), Federal Reserve Board, Consumer Financial Protection Bureau (CFPB), etc. Proficient knowledge of relevant cyber and/or technology process(es) and regulatory compliance requirements. Strong knowledge of cybersecurity principles and technologies. Experience working within a regulated, policy-driven environment. Experience with the full lifecycle of third-party relationships, including detailed tasks like invoice reconciliation and ensuring proper termination procedures. Knowledge of cybersecurity principles, technologies, and frameworks (e.g., NIST CSF, ISO 27001). Knowledge of third-party risk management methodologies and best practices (e.g., Shared Assessments). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. What sets you apart: Demonstrated experience with technology risk dimensions, including information security principles, and relevant laws, rules, and regulations. Demonstrated knowledge of cybersecurity principles (NIST 800.53), technologies, and frameworks, specifically NIST Cybersecurity Framework and ISO 27001. Relevant certifications such as CISSP (ISC2), CISA, CRISC, or other certifications from ISACA. Experience in auditing, particularly in the context of third-party risk management, including evaluating or conducting due diligence assessments. Possesses experience using Governance, Risk, and Compliance (GRC) tools and Third-Party Risk Management (TPRM) programs. Compensation range: The salary range for this position is: $85,040.00 - $162,550.00. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Senior Threat Detection Engineer The Threat Detection & Analytics team is seeking qualified professionals to join our ranks. This highly specialized team of skilled engineers serves as experts in creating high-quality detection logic and telemetry for our Security Operations Center (SOC) and related enterprise teams. With a world-class array of data-driven technologies at our disposal, we employ a risk-based approach to security detection based on best practices and industry frameworks. As a Detection Engineer, you will defend Capital One by helping to evolve, run, and maintain an adaptive threat detection program. General responsibilities of this role include: Analyzing data from a variety of sources (network, endpoint, application, etc.) and contributing to the full-lifecycle development of our cyber defense strategy Creating detection logic, models, tooling, and frameworks to help our SOC analysts detect potential cyber incidents Utilizing behavioral analytics technologies (e.g., UEBA) to better analyze and understand the full picture of user and entity behavior Participating in threat modeling sessions with other teams to identify and defend against adversary Tactics, Techniques and Procedures (TTPs) Leveraging automation platforms (e.g., SOAR) to improve incident identification and response times Onboarding and normalization of telemetry to enhance our Security Information and Event Management System (SIEM) Tuning detection capabilities and tooling to eliminate noise Collaborating with Offensive Security teams to analyze and evaluate security monitoring effectiveness Partnering with other engineering and security teams to improve our detection capabilities across the organization Leading design discussions, code reviews, and paired programming sessions Basic Qualifications: High school diploma, GED or equivalent certification At least 3 years of Cybersecurity experience At least 3 years of big data experience Preferred Qualifications: Bachelor's Degree 5+ years of cybersecurity experience 4+ years of AWS cloud security 4+ years of experience in SIEM 3+ years of scripting experience in Python or PowerShell 2+ years of experience in Splunk 2+ years of user/entity behavioral analytics At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. Riverwoods, IL: $144,200 - $164,600 for Prin Assoc, Cyber Technical McLean, VA: $158,600 - $181,000 for Prin Assoc, Cyber Technical New York, NY: $173,000 - $197,400 for Prin Assoc, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
12/17/2025
Full time
Senior Threat Detection Engineer The Threat Detection & Analytics team is seeking qualified professionals to join our ranks. This highly specialized team of skilled engineers serves as experts in creating high-quality detection logic and telemetry for our Security Operations Center (SOC) and related enterprise teams. With a world-class array of data-driven technologies at our disposal, we employ a risk-based approach to security detection based on best practices and industry frameworks. As a Detection Engineer, you will defend Capital One by helping to evolve, run, and maintain an adaptive threat detection program. General responsibilities of this role include: Analyzing data from a variety of sources (network, endpoint, application, etc.) and contributing to the full-lifecycle development of our cyber defense strategy Creating detection logic, models, tooling, and frameworks to help our SOC analysts detect potential cyber incidents Utilizing behavioral analytics technologies (e.g., UEBA) to better analyze and understand the full picture of user and entity behavior Participating in threat modeling sessions with other teams to identify and defend against adversary Tactics, Techniques and Procedures (TTPs) Leveraging automation platforms (e.g., SOAR) to improve incident identification and response times Onboarding and normalization of telemetry to enhance our Security Information and Event Management System (SIEM) Tuning detection capabilities and tooling to eliminate noise Collaborating with Offensive Security teams to analyze and evaluate security monitoring effectiveness Partnering with other engineering and security teams to improve our detection capabilities across the organization Leading design discussions, code reviews, and paired programming sessions Basic Qualifications: High school diploma, GED or equivalent certification At least 3 years of Cybersecurity experience At least 3 years of big data experience Preferred Qualifications: Bachelor's Degree 5+ years of cybersecurity experience 4+ years of AWS cloud security 4+ years of experience in SIEM 3+ years of scripting experience in Python or PowerShell 2+ years of experience in Splunk 2+ years of user/entity behavioral analytics At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. Riverwoods, IL: $144,200 - $164,600 for Prin Assoc, Cyber Technical McLean, VA: $158,600 - $181,000 for Prin Assoc, Cyber Technical New York, NY: $173,000 - $197,400 for Prin Assoc, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Senior Threat Detection Engineer The Threat Detection & Analytics team is seeking qualified professionals to join our ranks. This highly specialized team of skilled engineers serves as experts in creating high-quality detection logic and telemetry for our Security Operations Center (SOC) and related enterprise teams. With a world-class array of data-driven technologies at our disposal, we employ a risk-based approach to security detection based on best practices and industry frameworks. As a Detection Engineer, you will defend Capital One by helping to evolve, run, and maintain an adaptive threat detection program. General responsibilities of this role include: Analyzing data from a variety of sources (network, endpoint, application, etc.) and contributing to the full-lifecycle development of our cyber defense strategy Creating detection logic, models, tooling, and frameworks to help our SOC analysts detect potential cyber incidents Utilizing behavioral analytics technologies (e.g., UEBA) to better analyze and understand the full picture of user and entity behavior Participating in threat modeling sessions with other teams to identify and defend against adversary Tactics, Techniques and Procedures (TTPs) Leveraging automation platforms (e.g., SOAR) to improve incident identification and response times Onboarding and normalization of telemetry to enhance our Security Information and Event Management System (SIEM) Tuning detection capabilities and tooling to eliminate noise Collaborating with Offensive Security teams to analyze and evaluate security monitoring effectiveness Partnering with other engineering and security teams to improve our detection capabilities across the organization Leading design discussions, code reviews, and paired programming sessions Basic Qualifications: High school diploma, GED or equivalent certification At least 3 years of Cybersecurity experience At least 3 years of big data experience Preferred Qualifications: Bachelor's Degree 5+ years of cybersecurity experience 4+ years of AWS cloud security 4+ years of experience in SIEM 3+ years of scripting experience in Python or PowerShell 2+ years of experience in Splunk 2+ years of user/entity behavioral analytics At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. Riverwoods, IL: $144,200 - $164,600 for Prin Assoc, Cyber Technical McLean, VA: $158,600 - $181,000 for Prin Assoc, Cyber Technical New York, NY: $173,000 - $197,400 for Prin Assoc, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
12/17/2025
Full time
Senior Threat Detection Engineer The Threat Detection & Analytics team is seeking qualified professionals to join our ranks. This highly specialized team of skilled engineers serves as experts in creating high-quality detection logic and telemetry for our Security Operations Center (SOC) and related enterprise teams. With a world-class array of data-driven technologies at our disposal, we employ a risk-based approach to security detection based on best practices and industry frameworks. As a Detection Engineer, you will defend Capital One by helping to evolve, run, and maintain an adaptive threat detection program. General responsibilities of this role include: Analyzing data from a variety of sources (network, endpoint, application, etc.) and contributing to the full-lifecycle development of our cyber defense strategy Creating detection logic, models, tooling, and frameworks to help our SOC analysts detect potential cyber incidents Utilizing behavioral analytics technologies (e.g., UEBA) to better analyze and understand the full picture of user and entity behavior Participating in threat modeling sessions with other teams to identify and defend against adversary Tactics, Techniques and Procedures (TTPs) Leveraging automation platforms (e.g., SOAR) to improve incident identification and response times Onboarding and normalization of telemetry to enhance our Security Information and Event Management System (SIEM) Tuning detection capabilities and tooling to eliminate noise Collaborating with Offensive Security teams to analyze and evaluate security monitoring effectiveness Partnering with other engineering and security teams to improve our detection capabilities across the organization Leading design discussions, code reviews, and paired programming sessions Basic Qualifications: High school diploma, GED or equivalent certification At least 3 years of Cybersecurity experience At least 3 years of big data experience Preferred Qualifications: Bachelor's Degree 5+ years of cybersecurity experience 4+ years of AWS cloud security 4+ years of experience in SIEM 3+ years of scripting experience in Python or PowerShell 2+ years of experience in Splunk 2+ years of user/entity behavioral analytics At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. Riverwoods, IL: $144,200 - $164,600 for Prin Assoc, Cyber Technical McLean, VA: $158,600 - $181,000 for Prin Assoc, Cyber Technical New York, NY: $173,000 - $197,400 for Prin Assoc, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Manager, Network Security, Tech & Data Risk Management Capital One is one of the fastest growing organizations in the world today, powered by our passion for our customers. We are serious about technology, we dream big, and we execute: Capital One moved our entire enterprise to the public cloud over the course of five years. Just as we prioritize driving innovation through technology, we equally prioritize cybersecurity, reliability, software quality, and data management. Technology & Data Risk Management (TDRM) is a small organization that packs a big punch. The 200 professionals in TDRM are trusted experts who oversee 14,000 developers at Capital One. We raise the bar for excellence in cybersecurity, reliability, and tech risk, and data management risk. We shape strategy and decisions, challenge activities to ensure they meet our standards, and perform independent tests of our security and technology risk. For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Tech & Data Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and the risk of failing to manage our data. The CTRO is independent and oversees the work of the CISO, the CIO/CTO, and the Chief Data Officer. The CTRO reports to the Chief Risk Officer, who reports directly to the CEO. Our business leaders must make technology decisions constantly. TDRM makes sure they have the tech and data risk information they need to make good decisions. Associates within TDRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, data analyst, data scientist, and risk management professionals. They have a wealth of experience and a demonstrated ability to add value with their advice and to deliver high-impact results. Role-specific text This position - Manager, Network Security - is a unique opportunity for candidates with technical cybersecurity experience who have a desire to expand that expertise in a risk management organization. This individual will have the opportunity to leverage their technical subject matter expertise to provide advisory, oversight, and effective challenge to stakeholders within the first line of defense. This role will engage with and build relationships across multiple lines of defense while overseeing network security across Capital One's private and public cloud footprints. Responsibilities: Provide advisory, oversight, and effective challenge to the first line of defense. Provide technical assessments of cybersecurity controls design and effectiveness. Draft assessments for senior management and other stakeholders, to include regulatory agencies and the Board of Directors, as needed. Stay current on emerging cyber threats and potential implications to the firm. Collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to achieve objectives. Coordinate program-related activities and deliverables to ensure effective collaboration within the team and across stakeholder groups. Proven track record of leading, mentoring, and influencing others. Ability to communicate clearly in written and verbal form. Ability to manage multiple projects while maintaining superior results. Ability to work individually and cross-functionally. Execution oriented and a self-motivator. Basic Qualifications: Bachelor's degree or military experience 3+ years of experience in the financial services industry or highly regulated industry (healthcare, energy, telecommunications) 3+ years of experience implementing network defenses (firewalls, network access control, intrusion detection, intrusion prevention, web application firewalls, web gateways, and proxies) in AWS (Amazon Web Services) or GCP (Google Cloud Platform) 2+ years of experience implementing Zero Trust or Secure Access Service Edge (SASE) in AWS or GCP 1+ certifications for AWS or GCP 2+ years of audit or risk management experience Preferred Qualifications: 2+ years of experience with Palo Alto Networks technologies 1 or more audit or risk-focused certification: CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), or CISSP (Certified Information System Security Professional) 2+ years of experience implementing network defenses for global payment networks At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $193,400 - $220,700 for Manager, Cyber Technical New York, NY: $211,000 - $240,800 for Manager, Cyber Technical Plano, TX: $175,800 - $200,700 for Manager, Cyber Technical Richmond, VA: $175,800 - $200,700 for Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
12/17/2025
Full time
Manager, Network Security, Tech & Data Risk Management Capital One is one of the fastest growing organizations in the world today, powered by our passion for our customers. We are serious about technology, we dream big, and we execute: Capital One moved our entire enterprise to the public cloud over the course of five years. Just as we prioritize driving innovation through technology, we equally prioritize cybersecurity, reliability, software quality, and data management. Technology & Data Risk Management (TDRM) is a small organization that packs a big punch. The 200 professionals in TDRM are trusted experts who oversee 14,000 developers at Capital One. We raise the bar for excellence in cybersecurity, reliability, and tech risk, and data management risk. We shape strategy and decisions, challenge activities to ensure they meet our standards, and perform independent tests of our security and technology risk. For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Tech & Data Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and the risk of failing to manage our data. The CTRO is independent and oversees the work of the CISO, the CIO/CTO, and the Chief Data Officer. The CTRO reports to the Chief Risk Officer, who reports directly to the CEO. Our business leaders must make technology decisions constantly. TDRM makes sure they have the tech and data risk information they need to make good decisions. Associates within TDRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, data analyst, data scientist, and risk management professionals. They have a wealth of experience and a demonstrated ability to add value with their advice and to deliver high-impact results. Role-specific text This position - Manager, Network Security - is a unique opportunity for candidates with technical cybersecurity experience who have a desire to expand that expertise in a risk management organization. This individual will have the opportunity to leverage their technical subject matter expertise to provide advisory, oversight, and effective challenge to stakeholders within the first line of defense. This role will engage with and build relationships across multiple lines of defense while overseeing network security across Capital One's private and public cloud footprints. Responsibilities: Provide advisory, oversight, and effective challenge to the first line of defense. Provide technical assessments of cybersecurity controls design and effectiveness. Draft assessments for senior management and other stakeholders, to include regulatory agencies and the Board of Directors, as needed. Stay current on emerging cyber threats and potential implications to the firm. Collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to achieve objectives. Coordinate program-related activities and deliverables to ensure effective collaboration within the team and across stakeholder groups. Proven track record of leading, mentoring, and influencing others. Ability to communicate clearly in written and verbal form. Ability to manage multiple projects while maintaining superior results. Ability to work individually and cross-functionally. Execution oriented and a self-motivator. Basic Qualifications: Bachelor's degree or military experience 3+ years of experience in the financial services industry or highly regulated industry (healthcare, energy, telecommunications) 3+ years of experience implementing network defenses (firewalls, network access control, intrusion detection, intrusion prevention, web application firewalls, web gateways, and proxies) in AWS (Amazon Web Services) or GCP (Google Cloud Platform) 2+ years of experience implementing Zero Trust or Secure Access Service Edge (SASE) in AWS or GCP 1+ certifications for AWS or GCP 2+ years of audit or risk management experience Preferred Qualifications: 2+ years of experience with Palo Alto Networks technologies 1 or more audit or risk-focused certification: CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), or CISSP (Certified Information System Security Professional) 2+ years of experience implementing network defenses for global payment networks At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $193,400 - $220,700 for Manager, Cyber Technical New York, NY: $211,000 - $240,800 for Manager, Cyber Technical Plano, TX: $175,800 - $200,700 for Manager, Cyber Technical Richmond, VA: $175,800 - $200,700 for Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).